<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cisco Firewalls</title>
		<description><![CDATA[Leading Network Security & Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips & more.]]></description>
		<link>https://www.firewall.cx/cisco/cisco-firewalls.html</link>
		<lastBuildDate>Sat, 11 Apr 2026 12:42:14 +1000</lastBuildDate>
		<generator></generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.firewall.cx/cisco/cisco-firewalls.feed?type=rss"/>
		<language>en-gb</language>
		<item>
			<title>Converting Cisco Firepower from Platform mode to Appliance mode. Full ASA Backup with ASDM</title>
			<link>https://www.firewall.cx/cisco/cisco-firewalls/cisco-firepower-conversion-from-platform-to-appliance-mode.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-firewalls/cisco-firepower-conversion-from-platform-to-appliance-mode.html</guid>
			<description><![CDATA[<p><img src="https://www.firewall.cx//images/stories/cisco/asa-firewall/firepower-platform-to-appliance-mode/converting-cisco-firepower-platform-to-appliance-mode-intro.webp" alt="Converting Cisco Firepower from Platform mode to Appliance mode" width="500" height="300" loading="lazy"></p><p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco/asa-firewall/firepower-platform-to-appliance-mode/01-cisco-firepower-platform-to-appliance-mode-conversion.png" alt="cisco firepower platform to appliance mode conversion" width="300" height="180" style="margin: 7px; float: left;" title="cisco firepower platform to appliance mode conversion" />This article explains how to <strong>configure</strong> a <strong>Cisco Firepower 2100</strong> series device to operate in <strong>Appliance mode</strong>. We’ll show you how to <strong>switch</strong> from <strong>Platform mode</strong> to <strong>Appliance mode</strong> and how the device will <strong>automatically convert</strong> and <strong>retain</strong> your <strong>ASA configuration</strong>.</p>
<p style="text-align: justify;">Before performing the conversion, its important to obtain a <strong>full backup</strong> of the Firepower system and therefore also cover <strong>how to backup</strong> your <strong>Cisco Firepower appliance</strong> <strong>configuration</strong>, <strong>certificates, VPN configuration </strong>(including pre-shared keys)<strong>, VPN profiles</strong> and more, using the&nbsp; <strong>Cisco Adaptive Security Device Manager</strong> (<strong>ASDM)</strong>.&nbsp;</p>
<p><strong>Key Topics:</strong></p>
<ul>
<li><a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-firepower-conversion-from-platform-to-appliance-mode.html#platform-and-appliance-mode" title="Cisco Firepower Platform and Appliance Mode">Cisco Firepower Platform and Appliance Mode</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-firepower-conversion-from-platform-to-appliance-mode.html#how-to-backup-cisco-asa-asdm" title="How to Backup Cisco ASA using ASDM">How to Backup Cisco ASA using ASDM</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-firepower-conversion-from-platform-to-appliance-mode.html#converting-firepower-platform-to-appliance-mode" title="Converting Firepower from Platform to Appliance Mode">Converting Firepower from Platform to Appliance Mode</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-firepower-conversion-from-platform-to-appliance-mode.html#summary" title="Summary">Summary</a></li>
</ul>
<p class="box-info">More in-depth technical articles can be found in our <a href="https://www.firewall.cx/cisco/cisco-firewalls.html" target="_blank" title="Cisco Firewall section">Cisco Firewall section</a>.</p>
<h2><a id="platform-and-appliance-mode">Cisco Firepower Platform and Appliance Mode</a></h2>
<p style="text-align: justify;">The <strong>Cisco Firepower 2100 series</strong> operates on an underlying system called <strong>FXOS</strong>. You can run the <strong>Firepower 2100 for ASA</strong> in two modes:</p>
<ul>
<li style="text-align: justify;"><strong>Platform Mode</strong>: In this mode, you need to configure basic operating parameters and hardware interface settings within FXOS. This includes tasks like enabling interfaces, setting up EtherChannels, managing <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-ntp.html" target="_blank" title="Configuring NTP on Cisco Router">NTP</a>, and handling image management. You can use either the chassis manager web interface or the FXOS CLI for these configurations. Afterward, you can set up your security policy in the ASA operating system using ASDM or the ASA CLI.</li>
</ul>
<ul>
<li style="text-align: justify;"><strong>Appliance Mode (Default)</strong>: This mode allows you to configure all settings directly in the ASA. Only advanced troubleshooting commands are available through the FXOS CLI in this mode. <strong>Appliance mode</strong> is similar to how the old <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa5500-startup.html" target="_blank" title="Cisco ASA 5500 Series Firewalls">ASA Firewalls (5500 series)</a> ran when the FXOS didn’t exist.</li>
</ul>
<p style="text-align: justify;">The <strong>Management 1/1 interface</strong> is used to manage the Firepower device. The interface is configured with two IP addresses, <strong>one for the FXOS</strong> and <strong>one for the ASA</strong>. When changing to <strong>Appliance mode</strong>, the <strong>FXOS IP address</strong> is lost and will need to be reconfigured, however you can connect to the FXOS directly from the ASA software using the following command:</p>
]]></description>
			<category>Cisco Firewalls</category>
			<pubDate>Sat, 08 Jun 2024 08:41:22 +1000</pubDate>
		</item>
		<item>
			<title>Cisco ASA Firepower Threat Defense (FTD): Download and Installation/Setup ASA 5500-X. FTD Management Options</title>
			<link>https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firepower-threat-defense-ftd-installation-management.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firepower-threat-defense-ftd-installation-management.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>One Appliance – One Image</strong> is what Cisco is targeting for its Next Generation Firewalls. With this vision, Cisco has created a unified software image named “<strong>Cisco Firepower Threat Defense</strong>”. &nbsp;In this FirePOWER series article we’ll cover the <strong>installation of Firepower Threat Defense (FTD)</strong> on a Cisco <strong>ASA 5500-X</strong> series security appliance. We’ll also explain the <strong>management options</strong> available: <strong>Firepower Management Center</strong> (<strong>FMC</strong>) which is the old <strong>FireSIGHT</strong> and <strong>Firepower Device Manager</strong> (<strong>FDM</strong>).</p>
<p style="text-align: justify;"><strong>Cisco Firepower Threat Defense</strong> (<strong>FTD</strong>) is a unified software image, which is a combination of <strong>Cisco ASA</strong> and <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services.html" target="_blank" title="Cisco FirePOWER services"><strong>Cisco FirePOWER services</strong></a> features that can be deployed on <strong>Cisco Firepower 4100 </strong>and the <strong>Firepower 9300 Series </strong>appliances as well as on the <strong>ASA 5506-X,ASA 5506H-X</strong>, <strong>ASA 5506W-X</strong>, <strong>ASA 5508-X</strong>,&nbsp;<strong>ASA 5512-X</strong>, <strong>ASA 5515-X</strong>, <strong>ASA 5516-X</strong>, <strong>ASA 5525-X</strong>, <strong>ASA 5545-X</strong>, and<strong> ASA 5555-X</strong>. However, at the time of writing, the <strong>Cisco Firepower Threat Defense</strong> (<strong>FTD</strong>) unified software cannot be deployed on <strong>Cisco ASA 5505 </strong>and <strong>5585-X Series</strong> appliances.&nbsp;</p>
<h2 style="text-align: left;">Understanding Cisco Firepower Threat Defense Management &amp; Capabilities</h2>
<p style="text-align: justify;"><strong>Simplifying management</strong> and <strong>operation</strong> of <strong>Cisco’s Next Generation Firewalls</strong> is one of the primary reasons Cisco is moving to a <strong>unified image</strong> across its firewall appliances.</p>
<p style="text-align: justify;">Currently the <strong>Firepower Threat Defense</strong> can be managed through the <strong>Firepower Device Management</strong> (similar to Cisco’s ASDM) and <strong>Firepower Management Center </strong>(analyzed below).</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/asa-firewall/ftd-deployment/asa-firepower-threat-defense-software-management.png" alt="Managing Options for FirePOWER Services and Firepower Threat Defense (FTD)" style="display: block; margin-left: auto; margin-right: auto;" title="Managing Options for FirePOWER Services and Firepower Threat Defense (FTD)" /></p>
<p style="text-align: center;" align="center">Managing Options for FirePOWER Services and Firepower Threat Defense (FTD)</p>
<p style="text-align: justify;">It should be noted that the <strong>Firepower Device Management</strong> software is under extensive development and is not currently capable of supporting all configuration options. For this reason it’s best to rely on the <strong>Firepower Management Center</strong> to manage the Cisco <strong>Firepower Threat Defense</strong> system.</p>
<p style="text-align: justify;">The <strong>Firepower Management Center</strong>, also known as <strong>FMC </strong>or<strong> FireSIGHT</strong>, is available as a dedicated server or virtual image appliance (Linux based VM server) that connects to the <strong>FirePOWER</strong> or <strong>Firepower Threat Defense </strong>and allows you to fully manage either system. Organizations with multiple <strong>Firepower Threat Defense </strong>systems or <strong>FirePOWER Services</strong> would register and manage them from the <strong>FMC</strong>.</p>
<p style="text-align: justify;">Alternatively, users can manage the <strong>Firepower Threat Defense</strong> (<strong>FTD</strong>) device using the <strong>Firepower Device Manager</strong> (<strong>FDM</strong>) – the concept is similar to <strong>ASDM</strong>.</p>
<p style="text-align: justify;">Currently the latest<strong>Cisco Firepower Threat Defense</strong> (<strong>FTD</strong>) unified software image available is version 6.2.x .</p>
<p style="text-align: justify;">The <strong>Cisco Firepower Threat Defense</strong> is continually expanding the Next-Generation Firewall Servicesit supports which currently includes:</p>
<ul class="check">
<li style="text-align: justify;">Stateful Firewall Capabilities</li>
<li style="text-align: justify;">Static and Dynamic Routing. Supports RIP, OSPF, BGP, Static Routing</li>
<li style="text-align: justify;">Next-Generation Intrusion Prevention Systems (NGIPS)</li>
<li style="text-align: justify;">URL Filtering</li>
<li style="text-align: justify;">Application Visibility and Control (AVC)</li>
<li style="text-align: justify;">Advance Malware Protection (AMP)</li>
<li style="text-align: justify;">Cisco Identity Service Engine (Cisco ISE) Integration</li>
<li style="text-align: justify;">SSL Decryption</li>
<li style="text-align: justify;">Captive Portal (Guest Web Portal)</li>
<li style="text-align: justify;">Multi-Domain Management</li>
<li style="text-align: justify;">Rate Limiting</li>
<li style="text-align: justify;">Tunnelled Traffic Policies</li>
<li style="text-align: justify;">Site-to-Site VPN. Only supports Site-to-Site VPN between FTD appliances and FTD to ASA</li>
<li style="text-align: justify;">Multicast Routing Shared NAT</li>
<li style="text-align: justify;">Limited Configuration Migration (ASA to Firepower TD)</li>
</ul>
<p style="text-align: justify;">While the Cisco <strong>Firepower Threat Defense </strong>is being actively developed and populated with some great features, we feel that it’s too early to place it in a production environment. There are some stability issues, at least with the <strong>FTD image</strong> on the <strong>ASA platform</strong>, which should be ironed out with the newer software releases.</p>
<p class="box-warning" style="text-align: justify;">If you are already in the process of installing <strong>FTD </strong>on your ASA then you should heavily test it before rolling it out to production.</p>
<p style="text-align: justify;">Due to the issues encountered, we were forced to remove the FTD installation by reimaging our ASA 5555-X Appliance with Cisco ASA and FirePOWER Services images. We believe the “<strong>Cisco Firepower Threat Defense</strong>” unified software image is very promising but requires some more time to reach a more mature and stable version.</p>
<h2 style="text-align: left;">Problems/Limitations Encountered With Cisco Firepower Threat Defense</h2>
<p style="text-align: justify;">While small deployments might be able to overcome the absence of many desired features (e.g IPSec VPN support), enterprise environments will certainly find it more challenging.</p>
<p style="text-align: justify;">Depending on the environment and installation requirements customers will stumble into different <strong>limitations</strong> or <strong>issues</strong>. For example, on our<strong> ASA 5555-X</strong> we had <strong>major delays</strong> trying to <strong>push new policies</strong> from the <strong>Firepower Management Centre</strong> (<strong>FMC</strong>) to the <strong>newly imaged FTD ASA</strong>. With a total of just <strong>5 policies implemented</strong> it took <strong>over 2 minutes</strong> to deploy them from the <strong>FMC to the FTD</strong>.</p>
<p style="text-align: justify;">We also found that we were <strong>unable to configure any EtherChannel interfaces</strong>. This is considered a major drawback especially for organizations with <strong>multiple DMZ zones</strong> and <strong>high-bandwidth traffic requirements</strong>. Cisco has an official announcement for this <a href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/fdm/fptd-fdm-config-guide-620/fptd-fdm-interfaces.html#concept_6940083A55184D009B6406EF167C9DD4" target="_blank" rel="nofollow noopener" title="Cisco FTD on ASA Does not Support EtherChannel">right here</a>.</p>
<p style="text-align: justify;">In addition to the above, when we completed the <strong>conversion of our ASA to the FTD software</strong> we needed to open a <strong>TAC Service Request</strong> in order to get <strong>transfer</strong> our <strong>ASA License</strong> to the <strong>FTD image</strong>, adding additional unnecessary overhead and confusion. We believe this should have been automatically done during the installation process.</p>
<h2 style="text-align: left;">Cisco ASA Firepower Threat Defense (FTD) Installation – Quick Overview</h2>
<p style="text-align: justify;">Reimaging the Cisco ASA 5555-X Appliance to install the Cisco <strong>Firepower Threat Defense</strong> image is fairly simple once you understand what needs to be done. Here are the steps in the order they must be executed:</p>
<ul class="check">
<li style="text-align: justify;"><a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firepower-threat-defense-ftd-installation-management.html#download-the-cisco-firepower-threat-defense-boot-and-system-image" target="_blank" title="Download the Cisco Firepower Threat Defense Boot &amp; System Image">Download the Cisco Firepower Threat Defense Boot&amp;System image</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firepower-threat-defense-ftd-installation-management.html#reboot-asa-break-the-startup-boot-sequence" target="_blank" title="Reboot ASA, Break The Startup/Boot Sequence">Reboot ASA, Break The Startup/Boot Sequence</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firepower-threat-defense-ftd-installation-management.html#upload-the-boot-image-and-boot-the-asa-firewall" target="_blank" title="Upload the Boot Image and boot the ASA Firewall">Upload the Boot Image and boot the ASA Firewall</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firepower-threat-defense-ftd-installation-management.html#install-firepower-threat-defense-system-software" target="_blank" title="Install Firepower Threat Defense system software">Install Firepower Threat Defense system software</a></li>
</ul>
<h2 style="text-align: left;"><a name="download-the-cisco-firepower-threat-defense-boot-and-system-image">Download the Cisco Firepower Threat Defense Boot &amp; System Image</a></h2>
<p style="text-align: justify;">Using a valid CCO account that has the necessary software download privileges visit: <strong>Downloads Home</strong>&gt;<strong>Products Security</strong>&gt;<strong>Firewalls</strong>&gt;<strong>Next-Generation Firewalls (NGFW)</strong>&gt;<strong>ASA 5500-X with FirePOWER Services</strong> and select <strong>Firepower Threat Defense Software</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/asa-firewall/ftd-deployment/downloading-firepower-threat-defense-software.png" alt="Downloading Cisco ASA 55xx Firepower Threat Defense software" style="border: 1px solid #000000;" title="Downloading Cisco ASA 55xx Firepower Threat Defense software" /></p>
<p style="text-align: center;" align="center">Downloading Cisco ASA 55xx Firepower Threat Defense software</p>
<p style="text-align: justify;">Alternatively <strong>click</strong> on the following URL: <a href="https://software.cisco.com/download/home/286271174/type/286306337/release/6.6.7.1" target="_blank" rel="nofollow noopener" title="Firepower Threat Defense Software Download">Firepower Threat Defense Software Download</a></p>
<p style="text-align: justify;">Next, <strong>select </strong>and <strong>download </strong>the <strong>latest boot image </strong>and <strong>system version</strong>. In our example this is<strong>version 6.2.0</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/asa-firewall/ftd-deployment/downloading-firepower-threat-defense-boot-image-system.png" alt="Downloading the latest Firepower Threat Defense System and Boot Image" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Downloading the latest Firepower Threat Defense System and Boot Image" /></p>
<p style="text-align: center;">Downloading the latest Firepower Threat Defense System and Boot Image</p>
<h2 style="text-align: left;"><a name="reboot-asa-break-the-startup-boot-sequence">Reboot ASA, Break The Startup/Boot Sequence</a></h2>
<p style="text-align: justify;">When ready reboot the ASA appliance. During the boot process <strong>hit Break</strong> or <strong>Esc</strong> to interrupt boot:</p>
<p class="box-warning" style="text-align: justify;">It is strongly recommended you have a complete backup of your ASA Configuration and software before proceeding with the next steps which will erase the configuration and all files</p>
<p class="box-content" style="text-align: justify;">Rebooting... Cisco BIOS Version:9B2C109A<br />Build Date:05/15/2013 16:34:44<br />CPU Type: Intel(R) Xeon(R) CPU X3460 @ 2.80GHz, 2793 MHz<br />Total Memory:16384 MB(DDR3 1333)<br />System memory:619 KB, Extended Memory:3573 MB<br />……. &lt;output omitted&gt;<br />Booting from ROMMON<br />Cisco Systems ROMMON Version (2.1(9)8) #1: Wed Oct 26 17:14:40 PDT 2011<br />Platform ASA 5555-X with SW, 8 GE Data, 1 GE Mgmt<br />Use <strong>BREAK</strong> or <strong>ESC</strong> to interrupt boot.<br />Use SPACE to begin boot immediately.<br />Boot in 10 seconds.<br /><br /><strong>Boot interrupted.</strong><br />Management0/0<br />Link is DOWN<br />MAC Address: 00f6.63da.e807<br />Use ? for help.<br />rommon #1&gt;</p>
<p style="text-align: justify;">At this point we have successfully interrupted the boot process and can proceed to the next step.&nbsp;</p>
<h2 style="text-align: left;"><a name="upload-the-boot-image-and-boot-the-asa-firewall">Upload the Boot Image and Boot the ASA Firewall</a></h2>
<p style="text-align: justify;">We now need to configure the necessary parameters on the ASA Firewall to download the <strong>Cisco Firepower Threat Defence Boot Image</strong>. Ensure you have an <a href="https://www.firewall.cx/downloads/freeware-security-a-free-trials.html" target="_blank" title="FTP/TFTP server">FTP/TFTP server</a> installed and configured to allow the Firewall to download the image/system files.</p>
<p style="text-align: justify;">Now connect to the ASA console port using a terminal access application, e.g. Putty, configured with the following serial port settings:</p>
<ul class="check">
<li style="text-align: justify;">9600 baud</li>
<li style="text-align: justify;">8 data bits</li>
<li style="text-align: justify;">No parity</li>
<li style="text-align: justify;">1 stop bit</li>
<li style="text-align: justify;">No flow control</li>
</ul>
<p style="text-align: justify;">Ensure the Cisco ASA 5500-X appliance is running <strong>rommon version v1.1.8</strong> or greater by using an IOS command <strong>show module </strong>to ensure re-immaging will be successful. If the <strong>rommon version</strong> is <strong>earlier</strong> than <strong>v1.1.8</strong> then the ASA Appliance needs a <a href="https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/reimage/asa-ftd-reimage.html#pgfId-128106" target="_blank" rel="nofollow noopener" title="Cisco ASA rommon upgrade">rommon upgrade</a>.&nbsp;</p>
<p class="box-content" style="text-align: justify;">ciscoasa# <strong>show module</strong><br />.. output omitted…<br />Mod&nbsp;&nbsp;&nbsp; MAC Address Range &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; Hw Version&nbsp;&nbsp;&nbsp;&nbsp; Fw Version &nbsp; &nbsp; Sw Version<br />---- --------------------------------- ------------ ------------ ---------------<br />1 &nbsp; &nbsp;&nbsp;&nbsp; 7426.aceb.ccea to 7426.aceb.ccf2&nbsp;&nbsp;&nbsp; 0.3 &nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp; 1.1.8&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 9.6(1)<br />sfr&nbsp;&nbsp;&nbsp;&nbsp; 7426.aceb.cce9 to 7426.aceb.cce9 &nbsp;&nbsp; N/A&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; N/A</p>
<p style="text-align: justify;">Next, configure the ASA Firewall with the necessary network settings/variables so it can access the image and system files previously downloaded. ASA 5555-X firewall uses a built-in management interface, hence no need to specify the management interface.</p>
<p class="box-content" style="text-align: justify;">rommon #1&gt; <strong>address 10.32.4.129</strong><br />rommon #2&gt; <strong>server 10.32.4.150</strong><br />rommon #3&gt; <strong>gateway 10.32.4.150</strong><br />rommon #4&gt; <strong>file ftd-boot-9.7.1.0.cdisk</strong><br />rommon #5&gt; <strong>set</strong><br />ROMMON Variable Settings:<br />&nbsp;ADDRESS=10.32.4.129<br />&nbsp;SERVER=10.32.4.150<br />&nbsp;GATEWAY=10.32.4.150<br />&nbsp;PORT=Management0/0<br />&nbsp;VLAN=untagged<br />&nbsp;IMAGE=ftd-boot-9.7.1.0.cdisk<br />&nbsp;CONFIG=<br />&nbsp;LINKTIMEOUT=20<br />&nbsp;PKTTIMEOUT=4<br />&nbsp;RETRY=20</p>
<p>Explanation of commands:</p>
<div style="text-align: justify;">- <strong>Address</strong>: IP address of ASA Firewall</div>
<div style="text-align: justify;"><strong>- Server</strong>: The TFTP server from where the ASA will download the image</div>
<div style="text-align: justify;"><strong>- Gateway</strong>: The IP address of the network gateway. Mandatory even if the TFTP server is within the same logical network</div>
<div style="text-align: justify;"><strong>- File</strong> : The name of the file</div>
<div style="text-align: justify;"><strong>- Set</strong>: Shows the rommon settings</div>
<p style="text-align: justify;">The <strong>Sync</strong> command will save the NVRAM parameters, effectively “enabling” the configuration changes. It’s advisable to try and ping the <strong>TFTP server</strong>. This will not only confirm the TFTP server is reachable but also populate the ARP table of the ASA Firewall:</p>
<p class="box-content" style="text-align: justify;">rommon #6&gt; <strong>sync</strong><br />Updating NVRAM Parameters...<br /><br />rommon #7&gt; <strong>ping 10.32.4.150</strong><br />Sending 20, 100-byte ICMP Echoes to 10.32.4.150, timeout is 4 seconds:<br />?!!!!!!!!!!!!!!!!!!!<br />Success rate is 95 percent (19/20)</p>
<p style="text-align: justify;">When ready, issue the <strong>tftpdnld</strong> command to initiate the download of the boot image to the ASA Firewall. Once downloaded the system will automatically boot the image file:</p>
<p class="box-content">rommon #7&gt; <strong>tftpdnld</strong><br />ROMMON Variable Settings:<br /> ADDRESS=10.32.4.129<br /> SERVER=10.32.4.150<br /> GATEWAY=10.32.4.150<br /> PORT=Management0/0<br /> VLAN=untagged<br /> IMAGE=ftd-boot-9.7.1.0.cdisk<br /> CONFIG=<br /> LINKTIMEOUT=20<br /> PKTTIMEOUT=4<br /> RETRY=20<br /><br />tftp ftd-boot-9.7.1.0.cdisk@10.32.4.150 via 10.32.4.150<br />!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<br />Received 107292672 bytes<br /><br />Launching TFTP Image...<br /><br />Execute image at 0x14000<br /><br />Cisco Security Appliance admin loader (3.0) #0: Mon Jan 16 09:01:33 PST 2017<br />Platform ASA5555<br /><br />Loading...<br />IO memory blocks requested from bigphys 32bit: 125055<br />INIT: version 2.88 booting<br /><br />Starting udev<br />Configuring network interfaces... done.<br />Populating dev cache<br />Found device serial number FCH2023J78M.<br />Found USB flash drive /dev/sdc<br />Found hard drive(s): /dev/sda /dev/sdb<br />fsck from util-linux 2.23.2<br />dosfsck 2.11, 12 Mar 2005, FAT32, LFN<br />There are differences between boot sector and its backup.<br />Differences: (offset:original/backup)<br /> 65:01/00<br /> Not automatically fixing this.<br />/dev/sdc1: 62 files, 825465/2011044 clusters<br />Launching boot CLI ...<br />Configuring network interface using DHCP<br />Bringing up network interface.<br />Depending on your network, this might take a couple of minutes when using DHCP...<br />ifup: interface lo already configured<br />Using IPv6 address: fe80::2f6:63ff:feda:e807<br />IPv4 address not assigned. Run 'setup' before installation.<br />INIT: SwitchingStarting system message bus: dbus.<br />Starting OpenBSD Secure Shell server: sshd<br /> generating ssh RSA key...<br /> generating ssh ECDSA key...<br /> generating ssh DSA key...<br />Could not load host key: /etc/ssh/ssh_host_ed25519_key<br />done.<br />Starting Advanced Configuration and Power Interface daemon: acpid.<br />acpid: starting up<br />acpid: 1 rule loaded<br />acpid: waiting for events: event logging is off<br /><br />Starting ntpd: done<br />Starting syslog-ng:[2017-03-16T04:08:41.437297] Connection failed; fd='15', server='AF_INET(127.128.254.1:514)', local='AF_INET(0.0.0.0:0)', error='Network is unreachable (101)'<br />[2017-03-16T04:08:41.437321] Initiating connection failed, reconnecting; time_reopen='60'<br />.<br />Starting crond: OK<br /><br />&nbsp; &nbsp; &nbsp; Cisco FTD Boot 6.0.0 (9.7.1.)<br />&nbsp; &nbsp; &nbsp; Type ? for list of commands<br />FIREWALLCX-boot&gt;</p>
<p style="text-align: justify;">Optionally you can ping the tftp/ftp server to confirm there is still connectivity with the server:</p>
<p class="box-content" style="text-align: justify;">FIREWALLCX-boot&gt; <strong>ping 10.32.4.150</strong><br />PING 10.32.4.150 (10.32.4.150) 56(84) bytes of data.<br />64 bytes from 10.32.4.150: icmp_seq=1 ttl=128 time=0.722 ms<br />64 bytes from 10.32.4.150: icmp_seq=2 ttl=128 time=0.648 ms<br />64 bytes from 10.32.4.150: icmp_seq=2 ttl=128 time=0.856 ms<br />--- 10.32.4.150 ping statistics ---<br />3 packets transmitted, 3 received, 0% packet loss, time 2018ms<br />rtt min/avg/max/mdev = 0.648/0.742/0.856/0.086 ms</p>
<h2 style="text-align: left;"><a name="install-firepower-threat-defense-system-software">Install Firepower Threat Defense System Software&nbsp;</a></h2>
<p style="text-align: justify;">At this point our Firewall has successfully downloaded and booted the <strong>Boot image</strong> and is ready to accept the <strong>System image</strong>. At the prompt type <strong>setup</strong> and simply follow the bouncing ball. The setup process will gather important configuration parameters for the FTD device such as Hostname, IP address, Subnet mask, Gateway, DNS servers and more</p>
<p style="text-align: justify;">Many of the configuration questions involve a yes/no answer. The default value that will be selected when leaving the parameter blank and hitting enter is marked in square brackets <strong>[ ]</strong>:</p>
<p class="box-content" style="text-align: justify;">FIREWALLCX-boot&gt; <strong>setup</strong><br /><br />&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Welcome to Cisco FTD Setup <br />&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [hit Ctrl-C to abort]<br />&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Default values are inside []<br /><br />Enter a hostname [FIREWALLCX]: <strong>FIREWALLCXFTD</strong><br />Do you want to configure IPv4 address on management interface?(y/n) [Y]: y<br />Do you want to enable DHCP for IPv4 address assignment on management interface?(y/n) [Y]: n<br />Enter an IPv4 address: <strong>10.32.4.129</strong><br />Enter the netmask: <strong>255.255.255.0</strong><br />Enter the gateway: <strong>10.32.4.150</strong><br />Do you want to configure static IPv6 address on management interface?(y/n) [N]: n<br />Stateless autoconfiguration will be enabled for IPv6 addresses<br />Enter the primary DNS server IP address: <strong>10.32.4.150</strong><br />Do you want to configure Secondary DNS Server? (y/n) [n]: n<br />Do you want to configure Local Domain Name? (y/n) [n]: y<br />Enter the local domain name:<strong> firewall.cx</strong><br />Do you want to configure Search domains? (y/n) [n]: n<br />Do you want to enable the NTP service? [Y]: n<br />Please review the final configuration:<br /><br />Hostname:<strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;FIREWALLCXFTD</strong><br />Management Interface Configuration<br /><br />IPv4 Configuration: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<strong>static</strong><br />&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;IP Address: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <strong>10.32.4.129</strong><br />&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Netmask: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<strong>255.255.255.0</strong><br />&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Gateway: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<strong>10.32.4.150</strong><br /><br />IPv6 Configuration: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<strong>Stateless autoconfiguration</strong><br />DNS Configuration:<br />&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Domain: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<strong>firewall.cx</strong><br />&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;DNS Server: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<strong>10.32.4.150</strong><br /><br />NTP configuration: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<strong>Disable</strong><br /><br />CAUTION:<br />You have selected IPv6 stateless autoconfiguration, which assigns a global address<br />based on network prefix and a device identifier. Although this address is unlikely<br />to change, if it does change, the system will stop functioning correctly.<br />We suggest you use static addressing instead.<br /><br />Apply the changes?(y,n) [Y]: <strong>Y</strong><br />Configuration saved successfully!<br />Applying...<br />Restarting network services...<br />Done.<br /><strong>Press ENTER to continue...</strong></p>
<p style="text-align: justify;">At this point the appliance’s initial configuration phase is complete and ready to begin downloading the <strong>FTD system image</strong></p>
<p style="text-align: justify;">To initiate the image download use the <strong>system install ftp://10.32.4.150/ftd-6.2.0-362.pkg</strong> and replace the IP address portion with your FTP server’s IP address.</p>
<p style="text-align: justify;">During the installation, the process will ask for the necessary credentials to authenticate to the FTP server. Right before the point of no return the system will ask for a <strong>final confirmation</strong> before erasing<strong> the appliance’s disk</strong> and <strong>initiating the upgrade</strong>. When the <strong>system image installation is complete</strong>, the system will require the user to <strong>hit enter </strong>to<strong> reboot</strong>.</p>
<p class="box-info" style="text-align: justify;">Unnecessary output e.g. dots (….) have been removed from the log to make it easier to read and understand.</p>
<p class="box-content" style="text-align: justify;">FIREWALLCX-boot&gt; <strong>system install ftp://10.32.4.150/ftd-6.2.0-362.pkg</strong><br /><br />######################## WARNING ############################<br /># The content of disk0: will be erased during installation! #<br />#############################################################<br /><br />Do you want to continue? [y/N]: <strong>y</strong><br />Erasing disk0 ...<br />Extracting ...<br />Verifying. …<br /><br />Enter credentials to authenticate with ftp server<br />Username: <strong>firewallcx</strong><br />Password: <strong>$etmeup!</strong><br />Verifying. ... ... <br />Downloading. … ... <br />Extracting. … …<br /><br />Package Detail<br />&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Description: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Cisco ASA-FTD 6.2.0-362 System Install<br />&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Requires reboot: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Yes <br /><br />Do you want to continue with upgrade? [y]: <strong>y</strong><br />Warning: Please do not interrupt the process or turn off the system.<br />Doing so might leave system in unusable state.<br /><br />Starting upgrade process .... ….. …. <br />Populating new system image. ….. ….<br /><br />Reboot is required to complete the upgrade. Press '<strong>Enter</strong>' to reboot the system.<br /><br />Broadcast message from root@FIREWALLCXFTD (ttyS0) (Thu Mar 16 05:46:03 2017):<br /><strong>The system is going down for reboot NOW!</strong></p>
<p style="text-align: justify;">The ASA FTD Appliance will now reboot. While this process is underway you will see a lot of information during shutdown and startup. When booting into the FTD system image for the first time it is <strong>normal</strong> to see a number of <strong>error/warning messages</strong> – do not be alarmed.</p>
<p style="text-align: justify;">When the system has successfully booted it will require you to login using the default username (<strong>admin</strong>) &amp; password (<strong>cisco123</strong>) then require you to <strong>press Enter</strong> to present Cisco’s EULA which must be accepted at the end by&nbsp;<strong>pressing&nbsp;</strong>again the <strong>enter</strong> key or <strong>typing YES</strong>:</p>
<p class="box-content" style="text-align: justify;">Cisco ASA5555-X Threat Defense v6.2.0 (build 362)<br />firepower login: <strong>admin</strong><br />Password: <strong>cisco123</strong><br />You must accept the EULA to continue.<br />Press &lt;<strong>ENTER</strong>&gt; to display the EULA: <br />END USER LICENSE AGREEMENT<br />IMPORTANT: PLEASE READ THIS END USER LICENSE AGREEMENT CAREFULLY.<br />……………………………………..<br />Product warranty terms and other information applicable to Cisco products are<br />available at the following URL: http://www.cisco.com/go/warranty.<br /><br />Please enter '<strong>YES</strong>' or press &lt;<strong>ENTER</strong>&gt; to AGREE to the EULA: <strong>YES</strong></p>
<p style="text-align: justify;">Finally the last step involves <strong>changing</strong> the <strong>default admin password</strong> and configuring again the system’s network settings.</p>
<p style="text-align: justify;">While it might seem repetitive and pointless to configure the network settings three times during the FTD boot image and system image installation, this allows companies to perform these necessary preparation tasks in an isolated environment, e.g. lab room, to get the device ready for the final deployment that will be in the production environment.</p>
<p style="text-align: justify;">Similar to the previous steps, pressing <strong>enter</strong> will accept the default value shown between the brackets [ ]:</p>
<p class="box-content" style="text-align: justify;">System initialization in progress. Please stand by. <br />You must change the password for 'admin' to continue.<br />Enter new password: <strong>$etmeup!</strong><br />Confirm new password: <strong>$etmeup!</strong><br />You must configure the network to continue.<br />You must configure at least one of IPv4 or IPv6.<br />Do you want to configure IPv4? (y/n) [y]: <strong>y</strong><br />Do you want to configure IPv6? (y/n) [n]: <strong>n</strong><br />Configure IPv4 via DHCP or manually? (dhcp/manual) [manual]: <strong>manual</strong><br />Enter an IPv4 address for the management interface [192.168.45.45]: [<strong>enter</strong>]<br />Enter an IPv4 netmask for the management interface [255.255.255.0]: [<strong>enter</strong>]<br />Enter the IPv4 default gateway for the management interface [data-interfaces]: [<strong>enter</strong>]<br />Enter a fully qualified hostname for this system [firepower]: <strong>firewall.cx</strong><br />Enter a comma-separated list of DNS servers or 'none' [208.67.222.222,208.67.220.220]: [<strong>enter</strong>]<br />Enter a comma-separated list of search domains or 'none' []:[<strong>enter</strong>]<br />If your networking information has changed, you will need to reconnect. <br /> <br />DHCP server is enabled with pool: 192.168.45.46-192.168.45.254. You may disable with <strong>configure network ipv4 dhcp-server-disable</strong> For HTTP Proxy configuration, run '<strong>configure network http-proxy</strong>' <br /><br />Manage the device locally? (yes/no) [yes]: <strong>yes</strong> <br />Configuring firewall mode to router Update policy deployment information - add device configuration Successfully performed firstboot initial configuration steps for Firepower Device Manager for Firepower Threat Defense.<br /><strong>&gt;</strong></p>
<p style="text-align: justify;">The greater-than “<strong>&gt;</strong>” symbol indicates the FTD setup is complete and running.</p>
<p style="text-align: justify;">More information on the <strong>Cisco Firepower Threat Defense</strong>, including <strong>Installation</strong> and <strong>Upgrade Guides</strong>, can be found at the following Cisco URL:</p>
<p style="text-align: left;"><a href="https://www.cisco.com/c/en/us/support/security/firepower-ngfw/products-installation-guides-list.html" target="_blank" rel="nofollow noopener" title="Information on the Cisco Firepower Threat Defense, including Installation and Upgrade Guides">https://www.cisco.com/c/en/us/support/security/firepower-ngfw/products-installation-guides-list.html</a><a href="http://www.cisco.com/c/en/us/support/security/firepower-ngfw/products-installation-guides-list.html"></a></p>
<p style="text-align: justify;">You can now log into the <strong>Cisco Firepower Device Manager</strong> by entering the ASA Firewall appliance IP address in your web browser:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/asa-firewall/ftd-deployment/cisco-asa-firepower-device-manager-gui.jpg" alt="Cisco Firepower Device Manager Login Screen" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Firepower Device Manager Login Screen" /></p>
<p style="text-align: center;">Cisco Firepower Device Manager Login Screen</p>
<p style="text-align: justify;">Once logged in, you can follow the step-by-step setup <strong>Device Setup Wizard</strong> that will take you the necessary steps to initially configure your new ASA FTD device:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/asa-firewall/ftd-deployment/cisco-asa-firepower-device-manager-setup.jpg" alt="Device Setup Page of Cisco FTD" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Device Setup Page of Cisco FTD" /></p>
<p style="text-align: center;">Device Setup Page of Cisco FTD&nbsp;</p>
<p style="text-align: justify;">Experienced <strong>Firepower Threat Defense </strong>users can <strong>click</strong> on the <strong>Skip device setup</strong> link located on the lower area of the screen.</p>
<h2 style="text-align: left;">Summary</h2>
<p style="text-align: justify;"><strong>Cisco’s Firepower ThreatDefense</strong>(<strong>FTD</strong>) isthe<strong>Next-Generation Firewall </strong>solution that will eventually replace the well-known ASA software. While <strong>FTD</strong> is still in its early years it is rapidly being adopted by organizations across the globe. It is important to understand the current limitations of FTD before moving it into a production environment. For example, important features such as <strong>site-to-site VPN</strong> are not currently supported, however, it does have a great clean and intuitive GUI interface!</p>
<p style="text-align: justify;">For many, installing <strong>Cisco’s Firepower Threat Defense </strong>on an<strong> ASA Firewall</strong> appliance can be a confusing task. Our <strong>Cisco Firepower Threat Defense (FTD) installation guide</strong> has been designed to <strong>simplify the process</strong> by providing <strong>step-by-step instructions</strong> presented in an <strong>easy-to-understand format</strong> while also covering <strong>Cisco Firepower Threat Defense management options</strong>.</p>]]></description>
			<category>Cisco Firewalls</category>
			<pubDate>Thu, 13 Apr 2017 20:39:41 +1000</pubDate>
		</item>
		<item>
			<title>Cisco ASA 5500-X Series Firewall with IPS, ASA CX &amp; FirePower Services. Application Visibility and Control (AVC), Web Security, Botnet Filtering &amp; IPS / IDS, Firepower Threat Defense</title>
			<link>https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services-1.jpg" alt="cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services-1" width="235" height="134" style="margin: 7px; float: left;" title="ASA 5500-X series Intrusion Prevention &amp; Detection, CX &amp; FirePOWER" />The <strong>Cisco ASA Firewall 5500-X series</strong> has evolved from the previous ASA 5500 Firewall series, designed to protect mission critical corporate networks and data centers from today’s advanced security threats.</p>
<p style="text-align: justify;">Through sophisticated software and hardware options (modules), the ASA’s 5500-X series Firewalls support a number of greatly advanced next-generation security features that sets them apart.These include:</p>
<ul>
<li><strong>Cisco Intrusion Prevention System (IPS) services</strong>. A <strong>signature based IPS solution</strong> offered as a <strong>software or hardware module</strong> depending on the ASA 5500-X appliance model.</li>
<li><strong>Cisco ASA CX Context-aware services</strong>. A <strong>software module</strong> for ASA 5500-X appliances except the ASA 5585-X where it’s offered as a hardware module. Provides IPS services, Application Visibility and Control (AVC), web security and botnet filtering.</li>
<li><strong>Cisco FirePOWER Services</strong>. Cisco’s latest software &amp; hardware threat protection, superseding previous technologies by combining IPS and CX services plus full contextual awareness of users, infrastructure, applications and content, URL filtering with advanced malware protection (AMP). Offered as a software module for 5500-X series appliances except the 5585-X, which requires a dedicated hardware module. Note that <strong>FirePOWER services</strong> run in parallel with the classical ASA software.</li>
<li><strong>Cisco Firepower Threat Defense (FTD)</strong>. This is the next step after the <strong>FirePOWER services</strong> which was released by Cisco in 2015.&nbsp; While <strong>FirePOWER services</strong> run alongside with the classical Cisco ASA software, the newer <strong>Firepower Threat Defence</strong> combines the <strong>Cisco ASA Software + FirePOWER services</strong> in one software package. This is also the concept of the newer Firepower appliances (e.g 4100 &amp; 9000 series) which run <strong>Firepower Threat Defense</strong> software. At this point, <strong>Firepower Threat Defence</strong> is under continious development but does not still support many features offered by the classical ASA software. For example at the time of writing site-to-site IP Sec VPN is still not available.</li>
</ul>
<p style="text-align: justify;">Our <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-series-ips-ids-content-filtering-antimalware-hardware-modules.html" target="_blank" title="Cisco ASA 5500 Series Firewall Modules &amp; Cards – Content Security (CSC-SSM), IPS - IDS (AIP SCC &amp; AIP SSM) Hardware Modules">previous article</a> examined <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-series-ips-ids-content-filtering-antimalware-hardware-modules.html" target="_blank" title="Cisco ASA 5500 Series Firewall Modules &amp; Cards – Content Security (CSC-SSM), IPS - IDS (AIP SCC &amp; AIP SSM) Hardware Modules">Cisco’s ASA 5500 series Firewall hardware modules</a>, which include the Content Security <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-series-ips-ids-content-filtering-antimalware-hardware-modules.html" target="_blank" title="Cisco ASA 5500 Series Firewall Modules &amp; Cards – Content Security (CSC-SSM), IPS - IDS (AIP SCC &amp; AIP SSM) Hardware Modules">CSC-SSM</a> &amp; Intrusion Prevention System (IPS) / Intrusion Detection System (IDS) <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-series-ips-ids-content-filtering-antimalware-hardware-modules.html" target="_blank" title="Cisco ASA 5500 Series Firewall Modules &amp; Cards – Content Security (CSC-SSM), IPS - IDS (AIP SCC &amp; AIP SSM) Hardware Modules">AIP-SCC</a> / <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-series-ips-ids-content-filtering-antimalware-hardware-modules.html" target="_blank" title="Cisco ASA 5500 Series Firewall Modules &amp; Cards – Content Security (CSC-SSM), IPS - IDS (AIP SCC &amp; AIP SSM) Hardware Modules">AIP-SSM</a> modules. While these solutions are no longer sold by Cisco, they have been widely deployed in data centers and corporate networks around the world and will be supported by Cisco until 2018.</p>
<p class="box-info" style="text-align: justify;">Note: To download datasheets containing technical specifications and features offered by the Cisco 5500-X Series Firewalls with FirePOWER, IPS and CX Context-aware services, visit our <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-asa-5500-series-adaptive-security-appliances.html" target="_blank" title="Cisco ASA 5500 &amp; 5500-X Series Adaptive Security Appliances Download Section">Cisco ASA 5500 &amp; 5500-X Series Adaptive Security Appliances Download Section</a>.</p>
<p style="text-align: justify;">Since Cisco’s announcement back in 2013 regarding the discontinuation of its ASA 5500 series firewall appliances in favour of the newer 5500-X Next Generation Firewalls, customers have been contemplating when to upgrade to the newer 5500-<strong>X</strong> series. Given the fact that Cisco is no longer providing major firmware upgrades to the older ASA 5500 series and the appearance of new advanced security threats and malware (e.g ransomware), it is now considered imperative to upgrade to the newer platform so that security is maintained at the highest possible level.</p>
<p style="text-align: justify;">Customers seeking advanced protection are likely to consider expanding their ASA Firewall capabilities with the purchase of an <strong>IPS module</strong>, <strong>CX Context-aware</strong> or <strong>FirePOWER services</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services-2.png" alt="cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services-2" style="margin: 7px;" title="The Cisco FirePOWER hardware module for the ASA-5585-X Firewall" /></p>
<p style="text-align: center;">Figure 1. The Cisco FirePOWER hardware module for the ASA-5585-X Firewall</p>
<p style="text-align: justify;">Cisco’s <strong>FirePOWER advanced security threat protection solution</strong> was introduced late 2014 and its purpose is to replace the current<strong> ASA 5500-X IPS</strong> and <strong>ASA CX 5500-X Context-aware</strong> offerings.</p>
<p style="text-align: justify;">The diagram below shows <strong>key security features</strong> provided by most Cisco ASA Firewall appliances. Features such as Clustering, High Availability, Network profiling, Identity-Policy Control, VPN and advanced access lists have until today been fairly standard offerings across the ASA Firewall series, however, the newer 5500-X can now offer the additional <strong>FirePOWER services</strong> marked in red below:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services-3.png" alt="cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services-3" style="margin: 7px auto; display: block;" title="Cisco FirePOWER services (marked in red) provide advanced key security features to ASA Firewalls" /></p>
<p style="text-align: center;">Figure 2. Cisco FirePOWER services (marked in red) provide advanced key security features to ASA Firewalls</p>
<p style="text-align: justify;">Cisco’s FirePOWER solution has the ability not only to provide advanced zero-day IPS threat protection, but also to deliver exceptional security &amp; firewalling services such as <strong>Application Visibility &amp; Control</strong>, <strong>FirePower Analytics &amp; Automation</strong>, <strong>Advanced Malware Protection</strong> (<strong>AMP</strong>) &amp; <strong>Sandboxing</strong>, plus <strong>Web-based URL filtering</strong>, all in one box.</p>
<p style="text-align: justify;">While most of these additional FirePOWER services are subscription based, meaning companies will need to fork out additional money, they do offer significant protection and control and help to reduce administrative complexity.</p>
<p style="text-align: justify;">Customers utilizing Cisco’s <strong>Intrusion Prevention System</strong> (<strong>IPS</strong>) or <strong>FirePOWER services</strong> also have the option of the <strong>Cisco FireSIGHT Management Center</strong> – a solution used to centrally manage network security. Cisco’s <strong>FireSIGHT</strong> allows network administrators, security engineers and IT Managers to monitor events, analyse incidents, obtain detailed reporting and much more, from a single intuitive web-interface.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services-4.png" alt="cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services-4" style="margin: 7px auto; display: block;" title="The Cisco FireSIGHT Management Center Graphical Interface" /> Figure 3. The Cisco FireSIGHT Management Center Graphical Interface</p>
<p style="text-align: justify;">It’s evident that Cisco is marketing its ASA 5500-X series with FirePOWER services as its flagship network security &amp; threat protection solution, which is why Firewall.cx will be covering the Cisco <strong>FirePOWER</strong> &amp; <strong>FireSIGHT Management Center</strong> configuration in great depth in upcoming articles.</p>]]></description>
			<category>Cisco Firewalls</category>
			<pubDate>Tue, 28 Jun 2016 00:40:18 +1000</pubDate>
		</item>
		<item>
			<title>Cisco ASA 5500 Series Firewall Modules &amp; Cards – Content Security (CSC-SSM), IPS - IDS (AIP SCC &amp; AIP SSM) Hardware Modules</title>
			<link>https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-series-ips-ids-content-filtering-antimalware-hardware-modules.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-series-ips-ids-content-filtering-antimalware-hardware-modules.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-asa-firewall-5500-series-ips-ids-content-filtering-antimalware-hardware-modules-1.png" alt="cisco-asa-firewall-5500-series-ips-ids-content-filtering-antimalware-hardware-modules-1" style="margin: 7px; float: left;" title="AIP SSM-10,  AIP SSM-20 For ASA 5510 &amp; ASA 5520" />Cisco’s <strong>Adaptive Security Appliance</strong> (<strong>ASA</strong>) <strong>Firewalls</strong> are one of the most popular and proven security solutions in the industry. Since the introduction of the PIX and ASA Firewall into the market, Cisco has been continuously expanding its <strong>firewall security features</strong> and <strong>intrusion detection/prevention capabilities</strong> to adapt to the evolving security threats while integrating with other mission-critical technologies to <strong>protect corporate networks</strong> and <strong>data centers</strong>.</p>
<p style="text-align: justify;">In recent years, we’ve seen Cisco tightly integrate separate security technologies such as <strong>Intrusion Prevention Systems</strong> (<strong>IPS</strong>) and <strong>Intrusion Detection Systems</strong> (<strong>IDS</strong>) within the ASA Firewall appliances in the form of hardware module add-ons (older 5500 series &amp; newer 5500-X series) and, recently, software modules supported only by the newer ASA 5500-X series security appliances.</p>
<p style="text-align: justify;">With the addition of the <strong>software</strong> or <strong>hardware module</strong>, customers are able to increase the firewall’s security and protection capabilities while at the same time <strong>simplifing security management</strong> and <strong>administration</strong> by dealing with a single firewall device instead of multiple firewall, IPS or IDS devices.</p>
<p style="text-align: justify;">While this article covers the <strong>hardware modules</strong> available for the <strong>Cisco ASA 5500 Firewall series</strong>, upcoming articles will cover both <strong>software</strong> and <strong>hardware modules</strong> along with <strong>Cisco FirePOWER</strong> &amp; <strong>FireSIGHT</strong> management services for the newer <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services.html" target="_blank" title="Cisco ASA 5500-X IPS, CX and FirePOWER Services"><strong>ASA 5500-X series</strong></a>.</p>
<p class="box-info" style="text-align: justify;">Note: The Cisco ASA 5500 series hardware modules for ASA-5505, ASA 5510, ASA 5520 &amp; ASA 5540 have been announced as <a href="https://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/eol_C51-727284.html" target="_blank" rel="nofollow noopener" title="End-of-Sale &amp; End-of-Life"><strong>End-of-Sale</strong> &amp; <strong>End-of-Life</strong></a>. Modules below are no longer sold or supported by Cisco. Last day of support was <strong>30<sup>th</sup> of September 2018</strong>.</p>
<p>Users interested in the <strong>newer ASA 5500-X IPS</strong>, <strong>Context-Aware</strong> and <strong>FirePOWER services</strong> can read our article <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-5500-x-series-ips-context-aware-firepower-firesight-services.html" target="_blank" title="Cisco ASA 5500-X Series Firewall with IPS, ASA CX &amp; FirePower Services. Application Visibility and Control (AVC), Web Security, Botnet Filtering &amp; IPS / IDS">Cisco ASA 5500-X Series Firewall with IPS, ASA CX &amp; FirePower Services. Application Visibility and Control (AVC), Web Security, Botnet Filtering &amp; IPS / IDS</a>.</p>
<h2>Hardware Modules For ASA 5500 Series Firewalls</h2>
<p style="text-align: justify;">The ASA 5500 series Firewalls (ASA-5505, ASA 5510, ASA 5520, ASA 5540 etc) were the first security appliances with the capability to integrate hardware modules for enhanced security and threat protection.</p>
<p style="text-align: justify;">To help target different markets and security requirements, Cisco split its hardware module offerings into two distinct categories:</p>
<ul class="checkbox">
<li><strong>Content Security and Control Security Services (CSC-SSM)</strong></li>
<li><strong>Advanced Inspection and Prevention Security Services (AIP-SCC &amp; AIP-SSM)</strong></li>
</ul>
<p>Each hardware module card is equipped with its own CPU, RAM and Flash storage space, running a separate operating system that integrates with the ASA Firewall via its internal network ports.</p>
<p>Let’s take a brief look at each category.</p>
<h2>The Content Security &amp; Control Security Services Modules</h2>
<p style="text-align: justify;">The <strong>Content Security and Control Security Services</strong> module aims to cover corporate environments where comprehensive malware, advanced content filtering (including Web Caching, URL filtering, anti-phishing), and anti-spam filtering is required. This all-in-one hardware module solution is capable of providing a wealth of security and control capabilities essential for all size networks.</p>
<p style="text-align: justify;">Following are the hardware modules supporting <strong>Content Security and Control Security Services</strong>:</p>
<ul class="check">
<li><strong>CSC-SSM-10</strong>: For <strong>ASA 5510</strong> &amp; <strong>ASA 5520</strong>. Initial support for 50 users, upgradable up to 500 users</li>
<li><strong>CSC-SSM-20</strong>: For <strong>ASA 5510</strong>, <strong>ASA 5520</strong> &amp; <strong>ASA 5540</strong>. Initial support for 500 users, upgradable up to 1000 users</li>
</ul>
<p style="text-align: justify;">The <strong>CSC-SSM-10</strong> &amp; <strong>CSC-SSM-20</strong> modules look identical. Shown below is the <strong>CSC-SSM-20</strong> module:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-asa-firewall-5500-series-ips-ids-content-filtering-antimalware-hardware-modules-2.png" alt="" style="display: block; margin-left: auto; margin-right: auto;" title="The Cisco CSC-SSM-20 hardware module for the ASA 5500 series Firewalls" data-alt="The Cisco CSC-SSM-20 hardware module for the ASA 5500 series Firewalls" /></p>
<p style="text-align: center;" align="center">Figure 1. The Cisco CSC-SSM-20 hardware module for the ASA 5500 series Firewalls</p>
<p style="text-align: justify;">Users requiring additional information on the Cisco CSC-SSM modules, including features, hardware specifications, licenses, and support contracts (Smartnet), can download the <strong>Cisco ASA 5500 Series</strong> <strong>Content Security and Control Security Services </strong>datasheet from our <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-asa-5500-series-adaptive-security-appliances.html" target="_blank" title="Cisco ASA 5500 Product Datasheets and Guides download section">Cisco ASA 5500 Product Datasheets and Guides download section</a>.</p>
<h2>The Advanced Inspection &amp; Prevention Security Services Modules</h2>
<p style="text-align: justify;">The <strong>Advanced Inspection and Prevention Security Services </strong>modules combine IPS and IDS threat protection with mitigation services aiming to protect and stop malicious traffic before it can affect the network. Updates for the modules occur up to every 5 minutes, ensuring real-time updates and effective protection from zero-day attacks.</p>
<p style="text-align: justify;">Cisco ASA Firewall customers can choose between the following Advanced Inspection and Prevention Security Service modules depending on their ASA hardware platform:</p>
<ul class="check">
<li><strong>AIP SCC-5</strong>:For<strong> ASA 5505. </strong>1 Virtual sensor. 75Mbps concurrent threat mitigation throughput.</li>
<li><strong>AIP SSM-10</strong>: For <strong>ASA 5510 </strong>&amp;<strong> ASA 5520. </strong>4 Virtual sensors. Up to 225Mbps concurrent threat mitigation throughput depending on ASA model.</li>
<li><strong>AIP SSM-20</strong>: For <strong>ASA 5520</strong> &amp; <strong>ASA 5540</strong>. 4 Virtual sensors. Up to 500Mbps concurrent threat mitigation throughput depending on ASA model.</li>
<li><strong>AIP SSM-40</strong>: For <strong>ASA 5520</strong> &amp; <strong>ASA 5540</strong>. 4 Virtual sensors. Up to 650Mbps concurrent threat mitigation throughput depending on ASA model.</li>
</ul>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/cisco-asa-firewall-5500-series-ips-ids-content-filtering-antimalware-hardware-modules-3.png" alt="" style="display: block; margin-left: auto; margin-right: auto;" title="The Cisco ASA Firewall AIP SSC-5, AIP SSM-20 and AIP SSM40 IPS hardware modules" data-alt="The Cisco ASA Firewall AIP SSC-5, AIP SSM-20 and AIP SSM40 IPS hardware modules" /> Figure 2. The Cisco ASA Firewall AIP SSC-5, AIP SSM-20 and AIP SSM40 IPS hardware modules</p>
<p style="text-align: justify;">Users requiring additional information on the Cisco <strong>AIP SSC-5</strong> &amp; <strong>AIP-SSM</strong> modules, including features, hardware specifications, licenses, and support contracts (Smartnet), can download the <strong>Cisco ASA 5500 Series</strong> <strong>Advanced Inspection and Prevention Security Services module and card </strong>datasheet from our <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-asa-5500-series-adaptive-security-appliances.html" target="_blank" title="Cisco ASA 5500 Product Datasheets and Guides download section">Cisco ASA 5500 Product Datasheets and Guides download section</a>.</p>
<h2>Summary</h2>
<p style="text-align: justify;">The <strong>ASA 5500 Firewall series hardware modules</strong> offer a substantial number of <strong>network security enhancements</strong> making them ideal for corporate environments with sensitive data, in-house webservers and multiple VLANs &amp; VPN networks. Their ability to provide advanced malware threat protection, URL filtering and IPS / IDS services make them the ideal upgrade for any ASA 5500 series Firewall adding true value to protecting and mitigating security threats.</p>]]></description>
			<category>Cisco Firewalls</category>
			<pubDate>Thu, 16 Jun 2016 19:49:00 +1000</pubDate>
		</item>
		<item>
			<title>Understand &amp; Configure NAT Reflection, NAT Loopback, Hairpinning on Cisco ASA 5500-X for TelePresence ExpressWay and Other Applications</title>
			<link>https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-nat-reflection-loopback-hairpinning-configuration.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-nat-reflection-loopback-hairpinning-configuration.html</guid>
			<description><![CDATA[<p style="text-align: justify;">This article examines the concept of <strong>NAT Reflection</strong>, also known as <strong>NAT Loopback</strong> or <strong>Hairpinning</strong>, and shows how to <strong>configure a Cisco ASA Firewall</strong> running <strong>ASA version 8.2</strong> and earlier plus <strong>ASA version 8.3</strong> and later, to <strong>support NAT Reflection</strong>. NAT Reflection, is a <strong>NAT technique</strong> used when devices on the internal network (LAN) need to access a server located in a <strong>DMZ zone</strong> using its <strong>public IP address</strong>.</p>
<p style="text-align: justify;">What’s interesting is that <strong>NAT Reflection</strong> is not supported by all firewall appliances, however Cisco ASA Firewalls provide 100% support, making any NAT scenario possible. <strong>NAT Reflection</strong> is also seen at implementations of <strong>Cisco’s Telepresence systems</strong> where the <strong>ExpressWay-C</strong> server on the internal network needs to communicate with the <strong>ExpressWay-E</strong> server in the <strong>DMZ zone</strong> using its <strong>public IP address</strong>.</p>
<p class="box-info" style="text-align: justify;">Note: Users seeking additional information on <a href="https://www.firewall.cx/networking/network-address-translation.html" target="_blank" title="Network Address Translation concepts">Network Address Translation concepts </a>can visit our <a href="https://www.firewall.cx/networking/network-address-translation.html" target="_blank" title="Network Address Translation concepts">dedicated NAT Section</a> that covers NAT in great depth.</p>
<h2 style="text-align: left;">Single 3-Port/Leg Firewall DMZ With One LAN Interface ExpressWay-E Server</h2>
<p style="text-align: justify;">In the example below, <strong>ExpressWay-C</strong> with IP address <strong>192.168.1.50</strong> needs to access <strong>ExpressWay-E</strong> (<strong>DMZ zone</strong>, <strong>IP address 192.168.5.5</strong>) using its public IP address of <strong>203.40.40.5</strong>. This type of setup also happens to be one of the two most popular configurations:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/cisco-asa-firewall-nat-reflection-loopback-hairpinning-configuration-1.png" alt="NAT Reflection on a 3-Port ASA Firewall with Cisco Telepresence (ExpressWay-C &amp; ExpressWay-E)" style="display: block; margin-left: auto; margin-right: auto;" title="NAT Reflection on a 3-Port ASA Firewall with Cisco Telepresence (ExpressWay-C &amp; ExpressWay-E)" /></p>
<p style="text-align: center;" align="center">Figure 1. NAT Reflection on a 3-Port ASA Firewall with Cisco Telepresence (ExpressWay-C &amp; ExpressWay-E)</p>
<p style="text-align: justify;"><strong>ExpressWay-C</strong> packets traversing the <strong>ASA Firewall</strong> destined to <strong>ExpressWay-E’s public IP address</strong> will have the following transformation thanks to the <strong>NAT Reflection</strong> configuration:</p>
<ul style="margin-top: 0cm; text-align: justify;">
<li>Destination IP address <strong>203.40.40.5</strong> is <strong>replaced </strong>with Destination IP address <strong>192.168.5.5</strong> –<strong>ExpressWay-E’s</strong> private IP address. This is also known as <strong>Destination NAT</strong> (<strong>DNAT</strong>).</li>
<li>The Source IP address <strong>192.168.1.50</strong> (ExpressWay-C) is <strong>replaced</strong> with Source IP address <strong>192.168.5.1</strong> – ASA’s DMZ interface IP address. This is also known as <strong>Source NAT</strong> (<strong>SNAT</strong>).</li>
</ul>
<p style="text-align: justify;">When ExpressWay-C packets arrive to the ExpressWay-E server, they will have the following source &amp; destination IP address: <strong>Source IP: 192.168.5.1</strong>,<strong> Destination IP: 192.168.5.5</strong></p>
<p style="text-align: justify;">Translation of the source IP address (SNAT) of packets (192.168.1.50 to 192.168.5.1) for this traffic flow is optional however required specifically for the Cisco ExpressWay setup. The configuration commands for the above setup is as follows:</p>
<p style="text-align: justify;"><strong>For ASA Versions 8.3 and later:</strong></p>
<div class="box-content"><strong>object network obj-192.168.1.50<br /> host 192.168.1.50</strong><br /> !<br /> <strong>object network obj-192.168.5.5<br /> host 192.168.5.5</strong><br /> !<br /> <strong>object network obj-203.40.40.5<br />host 203.40.40.5</strong><br /> !<br /> <strong>nat (inside,DMZ) source static obj-192.168.1.50 interface destination static<br /> obj-203.40.40.5 obj-192.168.5.5</strong><br /> <br /> WARNING: All traffic destined to the IP address of the DMZ interface is being redirected.<br /> WARNING: Users may not be able to access any service enabled on the DMZ interface.</div>
<p style="text-align: justify;">NOTE: After the NAT command is applied you will receive the two above warning messages.</p>
<p style="text-align: justify;">The last line in our ASA configuration performs <strong>Source NAT</strong> and <strong>Destination NAT</strong> in one command.</p>
<p style="text-align: justify;"><strong>For ASA Versions 8.2 and earlier:</strong></p>
<p class="box-content"><strong>access-list INT-DMZ-IN extended permit ip host 192.168.1.50 host 203.40.40.5<br /> static (inside,DMZ) interface access-list INT-DMZ-IN</strong><br /> !<br /> <strong>access-list INT-DMZ-IN extended permit ip host 192.168.5.5 host 192.168.5.1<br /> static (DMZ,inside) 203.40.40.5 access-list INT-DMZ-IN</strong></p>
<p style="text-align: justify;">As shown, there are two levels of NAT occurring for this scenario, both required by the Cisco Telepresence - ExpressWay infrastructure.</p>
<h2 style="text-align: left;">Dual 2-Port/Leg Firewalls DMZ With One LAN Interface ExpressWay-E Server</h2>
<p style="text-align: justify;">The second most popular setup involves two firewalls, one protecting our <strong>LAN</strong> (Firewall 2) and one protecting our <strong>DMZ</strong> (Firewall 1) while also limiting traffic hitting our LAN firewall:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/cisco-asa-firewall-nat-reflection-loopback-hairpinning-configuration-2.png" alt="NAT Reflection on a 2-Port ASA Firewall with DMZ for Cisco Telepresence (ExpressWay-C &amp; ExpressWay-E)" style="display: block; margin-left: auto; margin-right: auto;" title="NAT Reflection on a 2-Port ASA Firewall with DMZ for Cisco Telepresence (ExpressWay-C &amp; ExpressWay-E)" /></p>
<p style="text-align: center;" align="center">Figure 2. NAT Reflection on a 2-Port ASA Firewall with DMZ for Cisco Telepresence (ExpressWay-C &amp; ExpressWay-E)</p>
<p style="text-align: justify;">In this slightly more complex setup, <strong>Firewall No.1</strong> is where we apply <strong>NAT Reflection</strong> to inbound traffic from <strong>ExpressWay-C</strong> server destined to <strong>ExpressWay-E’s </strong>public IP address<strong> 203.40.40.5</strong>.</p>
<p style="text-align: justify;">It’s important to note that returning traffic from <strong>ExpressWay-E</strong> to <strong>ExpressWay-C</strong> will <strong>have to pass through Firewall 1</strong> again. If an attempt is made to direct returning traffic through <strong>Firewall 2</strong> (bypassing Firewall 1) e.g via a <strong>static route</strong>, then we’ll have a condition known as <strong>Asymmetric Routing</strong>, possibly causing disruptions in the communication between the two servers.</p>
<p style="text-align: justify;">Note: <strong>Asymmetric Routing</strong> occurs when returning traffic between two hosts does not follow the same route as the original traffic. This condition is not favored by Firewalls as they track traffic and expect returning traffic to follow the same path originally taken.</p>
<p style="text-align: justify;"><strong>Firewall No.1</strong> is also configured with a <strong>one-to-one static NAT mapping</strong>, directing all traffic towards <strong>203.40.40.5</strong> to <strong>192.168.5.5</strong>.</p>
<p style="text-align: justify;"><strong>ExpressWay-C</strong> packets traversing <strong>ASA Firewall 1</strong> destined to <strong>ExpressWay-E’s public IP address</strong> will have the following transformation thanks to the <strong>NAT Reflection</strong> configuration:</p>
<ul style="margin-top: 0cm; text-align: justify;">
<li>Destination IP address <strong>203.40.40.5</strong> is <strong>replaced</strong> with Destination IP address <strong>192.168.5.5</strong> –<strong>ExpressWay-E’s</strong> private IP address. This is also known as <strong>Destination NAT</strong> (<strong>DNAT</strong>).</li>
<li>The Source IP address <strong>192.168.1.50</strong> (ExpressWay-C) is <strong>replaced</strong> with Source IP address <strong>192.168.5.2</strong> – <strong>Firewall 1’s</strong> internal interface IP address. This is also known as <strong>Source NAT</strong> (<strong>SNAT</strong>).</li>
</ul>
<p style="text-align: justify;"><strong>Firewall 2</strong> does <strong>not perform any NAT</strong> for traffic between ExpressWay-C and ExpressWay-E. When ExpressWay-C packets arrive to the ExpressWay-E server, they will have the following source &amp; destination IP address: <strong>Source IP: 192.168.5.2</strong>,<strong> Destination IP: 192.168.5.5</strong></p>
<p style="text-align: justify;">Translation of the source IP address (SNAT) of packets (192.168.1.50 to 192.168.5.2) for this traffic flow is optional however required specifically for the Cisco ExpressWay setup. The configuration commands for the above setup is as follows:</p>
<p style="text-align: justify;"><strong>For ASA Versions 8.3 and later:</strong></p>
<div class="box-content"><strong>object network obj-192.168.1.50<br /> host 192.168.1.50</strong><br /> !<br /> <strong>object network obj-192.168.5.5<br /> host 192.168.5.5</strong><br /> !<br /> <strong>object network obj-203.40.40.5<br />host 203.40.40.5</strong><br /> !<br /> <strong>nat (inside,DMZ) source static obj-192.168.1.50 interface destination static<br /> obj-203.40.40.5 obj-192.168.5.5</strong><br /> <br /> WARNING: All traffic destined to the IP address of the DMZ interface is being redirected.<br /> WARNING: Users may not be able to access any service enabled on the DMZ interface.</div>
<p style="text-align: justify;">NOTE: After the NAT command is applied you will receive the two above warning messages.</p>
<p style="text-align: justify;">The last line in our <strong>ASA v8.3</strong> and later configuration performs <strong>Source NAT</strong> and <strong>Destination NAT</strong> in one command.</p>
<p style="text-align: justify;"><strong>For ASA Versions 8.2 and earlier:</strong></p>
<div class="box-content"><strong>access-list INT-DMZ-IN extended permit ip host 192.168.1.50 host 203.40.40.5<br /> static (inside,DMZ) interface access-list INT-DMZ-IN</strong><br /> !<br /> <strong>access-list INT-DMZ-IN extended permit ip host 192.168.5.5 host 192.168.5.1<br /> static (DMZ,inside) 203.40.40.5 access-list INT-DMZ-IN</strong></div>
<h2 style="text-align: left;">Summary</h2>
<p style="text-align: justify;"><strong>NAT Reflection</strong> (<strong>NAT Loopback</strong> or <strong>Hairpinning</strong>) is a fairly new <strong>NAT concept</strong> to most but as we’ve seen it’s a fairly easy one to understand. Implementations of NAT Reflection are slowly becoming popular due to the new and complex technologies that require this type of NAT functionality – <strong>Telepresence</strong> and <strong>video conferencing</strong> being one of them. We covered <strong>NAT Reflection</strong> for the two most <strong>popular Firewall configurations</strong> including diagrams and <strong>ASA Firewall configuration commands</strong>.</p>]]></description>
			<category>Cisco Firewalls</category>
			<pubDate>Fri, 22 Apr 2016 10:00:00 +1000</pubDate>
		</item>
		<item>
			<title>Upgrading - Uploading AnyConnect Secure Mobility Client v4.x SSL VPN on Cisco ASA 5506-X, 5508-X, 5512-X, 5515-X, 5516-X, 5525-X, 5545-X, 5555-X, 5585-X</title>
			<link>https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-anyconnect-secure-mobility-4-upgrade.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa-firewall-anyconnect-secure-mobility-4-upgrade.html</guid>
			<description><![CDATA[<p style="text-align: justify;">This article will show how to <strong>download</strong> and <strong>upload</strong> the newer <strong>AnyConnect 4.x VPN clients</strong> to your <strong>Cisco</strong> <strong>ASA Firewall appliance</strong> (5500 &amp; 5500-X Series) and <strong>configure WebVPN</strong> so that the newer AnyConnect VPN client is used and distributed to the <strong>remote VPN clients</strong>.</p>
<p>The <strong>Cisco AnyConnect SSL VPN</strong> has become the VPN standard for Cisco equipment, replacing the older <strong>Cisco</strong> <strong>IPSec VPN Client</strong>. With the introduction of the <strong>newer 4.x AnyConnect</strong>, Cisco has made dramatic changes to their licensing and features supported. Our Cisco <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-anyconnect-license-plus-perpetual-apex-essential-premium-ssl-mobility-vpn.html" target="_blank" title="AnyConnect 4.x Licensing article">AnyConnect 4.x Licensing article</a> explains the differences with the newer 4.x licensing and has all the details to help organizations of any size <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-anyconnect-license-plus-perpetual-apex-essential-premium-ssl-mobility-vpn.html" target="_blank" title="migrate from 3.x AnyConnect to 4.x">migrate from 3.x AnyConnect to 4.x</a>. You’ll also find the necessary Cisco ordering codes along with their caveats.</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-asa-firewall-anyconnect-secure-mobility-4-upgrade-1.png" alt="cisco-asa-firewall-anyconnect-secure-mobility-4-upgrade-1" style="display: block; margin-left: auto; margin-right: auto;" title="ASA Firewall AnyConnect 4.x Upgrade - Upload Installation" /></p>
<p style="text-align: center;">Figure 1. Cisco AnyConnect v4.x</p>
<p style="text-align: justify;">The latest AnyConnect client at the time of writing is version <strong>4.2.02075,</strong> which is available for Cisco customers with <a href="https://www.firewall.cx/cisco/cisco-firewalls/cisco-anyconnect-license-plus-perpetual-apex-essential-premium-ssl-mobility-vpn.html" target="_blank" title="AnyConnect Plus or Apex licenses">AnyConnect Plus or Apex licenses</a>. Cisco provides both head-end and standalone installer files. The head-end files (.pkg extension) are deployed on the Cisco ASA Firewall and automatically downloaded by the VPN clients once authenticated via the web browser.</p>
<h2><strong>Uploading AnyConnect Secure Mobility Packages To The ASA Firewall</strong></h2>
<p style="text-align: justify;">Images can be uploaded to the Cisco ASA Firewall via a standard tftp client using the <strong>copy tftp flash:</strong> command:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">ASA-5506X# <strong><strong>copy tftp flash:</strong></strong>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Address or name of remote host []? <strong>192.168.10.54</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Source filename []? <strong>anyconnect-win-4.2.02075-k9.pkg</strong></div>
<div style="margin-bottom: 0.0001pt;">Destination filename [anyconnect-win-4.2.02075-k9.pkg]? [<strong>Hit Enter</strong> to keep same filename]</div>
<div style="margin-bottom: 0.0001pt;">Accessing tftp://192.168.10.54/anyconnect-win-4.2.02075-k9.pkg...!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!</div>
<div style="margin-bottom: 0.0001pt;">Writing file disk0:/anyconnect-win-4.2.02075-k9.pkg !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">INFO: No digital signature found</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">19426316 bytes copied in 85.820 secs (228544 bytes/sec)</div>
</div>
<p style="margin-bottom: 0.0001pt; text-align: justify;">We repeat the same commands <strong>until all 3 files</strong> have been uploaded so we can fully support Windows, Linux and MAC OS clients.</p>
<p style="margin-bottom: 0.0001pt; text-align: justify;">Using the <strong>dir</strong> command at the end of the process confirms all files have been successfully uploaded to our ASA Firewall:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">ASA-5506X# <strong><strong>dir</strong></strong>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Directory of disk0:/</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">97&nbsp;&nbsp;&nbsp;&nbsp; -rwx 69454656&nbsp;&nbsp;&nbsp;&nbsp; 18:01:00 Aug 04 2015 asa941-lfbff-k8.SPA</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">98&nbsp;&nbsp;&nbsp;&nbsp; -rwx 26350916&nbsp;&nbsp;&nbsp;&nbsp; 18:01:34 Aug 04 2015 asdm-741.bin</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">99&nbsp;&nbsp;&nbsp;&nbsp; -rwx 33&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 04:09:03 Feb 27 2016 .boot_string</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">11&nbsp;&nbsp;&nbsp;&nbsp; drwx 4096&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 18:04:04 Aug 04 2015 log</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">22&nbsp;&nbsp;&nbsp;&nbsp; drwx 4096&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 18:05:10 Aug 04 2015 crypto_archive</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">23&nbsp;&nbsp;&nbsp;&nbsp; drwx 4096&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 18:05:30 Aug 04 2015 coredumpinfo</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">100&nbsp;&nbsp; -rwx 41836544&nbsp;&nbsp;&nbsp;&nbsp; 18:10:02 Aug 04 2015 asasfr-5500x-boot-5.4.1-211.img</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">103&nbsp;&nbsp; -rwx 19426316&nbsp;&nbsp;&nbsp;&nbsp; 06:58:37 Feb 27 2016 <strong>anyconnect-win-4.2.02075-k9.pkg</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">104&nbsp;&nbsp; -rwx 12996288&nbsp;&nbsp;&nbsp;&nbsp; 07:01:17 Feb 27 2016 <strong>anyconnect-linux-64-4.2.02075-k9.pkg</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">105&nbsp;&nbsp; -rwx 17519719&nbsp;&nbsp;&nbsp;&nbsp; 07:04:26 Feb 27 2016 <strong>anyconnect-macosx-i386-4.2.02075-k9.pkg</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">7859437568 bytes total (4448530432 bytes free)</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">ASA-5506X#</div>
</div>
<h2><strong>Registering The New AnyConnect Packages</strong></h2>
<p style="margin-bottom: 0.0001pt; text-align: justify;">Assuming AnyConnect is already configured on your ASA Firewall, registering the new packages is a very simple process. In the near future, we’ll be including a full guide on how to setup AnyConnect Secure Mobility on Cisco ASA Firewalls.</p>
<p style="margin-bottom: 0.0001pt; text-align: justify;">Enter configuration mode and in the webvpn section add the following commands:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">ASA-5506X(config)# <strong><strong>webvpn</strong></strong>
<div style="margin-bottom: 0.0001pt; text-align: justify;">ASA-5506X(config-webvpn)# <strong>anyconnect image disk0:/anyconnect-win-4.2.02075-k9.pkg 1</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">ASA-5506X(config-webvpn)# <strong>anyconnect image disk0:/anyconnect-linux-64-4.2.02075-k9.pkg 2</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">ASA-5506X(config-webvpn)# <strong>anyconnect image disk0:/anyconnect-macosx-i386-4.2.02075-k9.pkg 3</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">ASA-5506X(config-webvpn)# <strong>anyconnect enable</strong></div>
</div>
<p style="margin-bottom: 0.0001pt; text-align: justify;">When dealing with multiple clients (supported platforms) of AnyConnect, assign an order to the client images using the numbers (1, 2, 3) at the end of each package command as shown above.</p>
<p style="margin-bottom: 0.0001pt; text-align: justify;">Previous versions of AnyConnect packages (.pkg) can be removed from the configuration by using the <strong>no anyconnect image disk0:/anyconnect-win-xxxxx-k9.pkg</strong> command.</p>
<h2><strong>Verifying The New AnyConnect Packages</strong></h2>
<p style="margin-bottom: 0.0001pt; text-align: justify;">As a final step, we can verify that the AnyConnect packages have been successfully installed using the <strong>show webvpn anyconnect</strong> command:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">ASA-5506X# <strong><strong>show webvpn anyconnect</strong></strong>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">1. disk0:/anyconnect-win-4.2.02075-k9.pkg 1 dyn-regex=/Windows NT/</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">CISCO STC win2k+</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">4,2,02075</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Hostscan Version 4.2.02075</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Wed 02/17/2016 23:34:33.75</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">2. disk0:/anyconnect-linux-64-4.2.02075-k9.pkg 2 dyn-regex=/Linux x86_64/</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">CISCO STC Linux_64</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">4.2.02075</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Wed Feb 17 23:03:53 EST 2016</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">3. disk0:/anyconnect-macosx-i386-4.2.02075-k9.pkg 3 dyn-regex=/Intel Mac OS X/</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">CISCO STC Darwin_i386</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">4.2.02075</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Wed Feb 17 23:59:03 EST 2016</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">3 AnyConnect Client(s) installed</div>
</div>
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">This completes the <strong>upgrade process</strong> of <strong>AnyConnect Secure Mobility Client</strong> on an <strong>ASA Firewall Security appliance</strong>. We saw all <strong>CLI commands</strong> involved to <strong>upload</strong> and <strong>register</strong> <strong>the new AnyConnect packages</strong>, <strong>remove the old AnyConnect packages</strong> and finally <strong>verify the packages</strong> are correctly registered for usage.</p>]]></description>
			<category>Cisco Firewalls</category>
			<pubDate>Wed, 09 Mar 2016 22:30:25 +1100</pubDate>
		</item>
		<item>
			<title>Demystifying Cisco AnyConnect 4.x Licensing. Plus, Plus Perpetual, Apex &amp; Migration Licenses for Cisco IOS Routers &amp; ASA Firewalls (5500/5500-X Series). Supported Operating Systems &amp; Ordering Guide</title>
			<link>https://www.firewall.cx/cisco/cisco-firewalls/cisco-anyconnect-license-plus-perpetual-apex-essential-premium-ssl-mobility-vpn.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-firewalls/cisco-anyconnect-license-plus-perpetual-apex-essential-premium-ssl-mobility-vpn.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-anyconnect-license-plus-perpetual-apex-essential-premium-ssl-mobility-vpn-01a.png" alt="cisco-anyconnect-license-plus-perpetual-apex-essential-premium-ssl-mobility-vpn-01a" width="70" height="70" style="margin: 7px; float: left;" title="Cisco anyconnect license plus" />In late 2014, Cisco announced the new licensing model for the <strong>latest AnyConnect Secure Mobility client v4.x</strong>. With this new version, Cisco introduced a number of <strong>new features</strong>, but also <strong>simplified the licensing model</strong> which was somewhat confusing. In this article, we will take a look at the <strong>new AnyConnect 4.x licenses</strong> which consist of: <strong>AnyConnect Plus license, AnyConnect Plus Perpetual license</strong> and <strong>AnyConnect Apex license</strong>.<br />&nbsp;<br />We will also show how the new licenses map to the older <strong>AnyConnect Essentials</strong> and <strong>AnyConnect Premium license</strong>, plus the available migration paths. Finally, we also take a look at Cisco’s <strong>Software Application Support (SAS)</strong> and <strong>Software Application Support plus Upgrade (SASU)</strong>, which are required when purchasing AnyConnect.</p>
<p style="text-align: justify;">All <strong>AnyConnect licenses prior to version 4</strong> had the <strong>AnyConnect Essentials</strong> and<strong> Premium licensing</strong> scheme. The newer v4.x <strong>AnyConnect licenses</strong> now have one of the <strong>three licensing options</strong>:</p>
<ul class="check">
<li class="checkbox" style="text-align: justify;"><strong>Cisco AnyConnect Plus License</strong> (Subscription Based)</li>
<li class="checkbox" style="text-align: justify;"><strong>Cisco AnyConnect Plus Perpetual License</strong> (Permanent – no subscription)</li>
<li class="checkbox" style="text-align: justify;"><strong>Cisco AnyConnect Apex License</strong> (Subscription Based)</li>
</ul>
<p style="text-align: justify;">With the new AnyConnect licenses, Cisco has moved to a <strong>subscription-based licensing model</strong> which means customers will unfortunately need to fork out more money in the long run.&nbsp; The <strong>Plus Perpetual License</strong> on the other hand allows Cisco customers to purchase a one-time license, however the license costs significantly higher than the subscription-based license.</p>
<p style="text-align: justify;">We should also note that <strong>AnyConnect 4.0 is not licensed based on simultaneous connections</strong> (like the previous AnyConnect 3.x), but is now <strong>user-based</strong>. This means a user connecting via his smartphone and laptop simultaneously <strong>will only occupy a single license</strong>.</p>
<p style="text-align: justify;">Since the newer AnyConnect licenses are subscription-based, according to Cisco, if their subscription expires and is not renewed, they will stop working.<br />&nbsp; <br />Cisco AnyConnect Secure Mobility Client 4.0 supports the following operating systems:</p>
<ul style="list-style-type: square; text-align: justify;">
<li>Windows 8.1 (32bit &amp; 64Bit)</li>
<li>Windows 8 (32bit &amp; 64Bit)</li>
<li>Windows 7 (32bit &amp; 64Bit)</li>
<li>Linux Ubuntu 12.X 64Bit</li>
<li>Linux RedHat 6 64Bit</li>
<li>Mac OS X 10.10 – 10.8</li>
</ul>
<p style="text-align: justify;">As expected, Windows XP is no longer supported.</p>
<p style="text-align: justify;">Let’s take a look at each license feature and how the older AnyConnect Essentials and Premium licenses map to the newer AnyConnect Plus and Apex licenses:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco-anyconnect-license-plus-perpetual-apex-essential-premium-ssl-mobility-vpn-01.png" alt="cisco-anyconnect-license-plus-perpetual-apex-essential-premium-ssl-mobility-vpn-01" width="450" height="500" style="margin: 0px;" title="Mapping AnyConnect 3.x Essentials &amp; Premium to AnyConnect 4.x Plus &amp; Apex" /></p>
<p style="text-align: center;">Figure 1. Mapping AnyConnect 3.x Essentials &amp; Premium to AnyConnect 4.x Plus &amp; Apex</p>
<p style="text-align: justify;"><strong>Related AnyConnect Articles on Firewall.cx:</strong></p>
<ul style="list-style-type: disc;">
<li><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-anyconnect-webvpn.html" target="_blank" title="Configuring Cisco SSL VPN AnyConnect 3.x (WebVPN) on Cisco IOS Routers">Configuring Cisco SSL VPN AnyConnect 3.x (WebVPN) on Cisco IOS Routers</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-web-vpn.html" target="_blank" title="WEB SSL VPN - The Next Wave Of Secure VPN Services">WEB SSL VPN - The Next Wave Of Secure VPN Services</a></li>
</ul>
<h2 style="text-align: left;">Cisco AnyConnect Plus License (Old Essentials License) 5, 3 or 1-Year Term</h2>
<p style="text-align: justify;">The <strong>AnyConnect Plus License</strong> is a<strong> subscription-based license</strong> with the option of a <strong>5</strong>, <strong>3</strong> or <strong>1-year renewable subscriptio</strong>n and supports the following features:</p>
<ul class="checkbox">
<li>
<div><strong>VPN Support for Devices</strong>. Includes Workstations and Laptops.</div>
</li>
<li>
<div><strong>Secure Mobility Client support (AnyConnect Mobile)</strong>. Includes mobile phones, tablets etc.</div>
</li>
<li>
<div><strong>SSL VPN (Client-based)</strong></div>
</li>
<li>
<div><strong>Per-app VPN</strong>. Authorize specific applications access the VPN.&nbsp; Supports specific devices and software.</div>
</li>
<li>
<div><strong>Basic endpoint context collection</strong></div>
</li>
<li>
<div><strong>IEEE 802.1X Windows supplicant</strong></div>
</li>
<li>
<div><strong>Cisco Cloud Web Security agent</strong> for Windows &amp; Mac OS X platforms</div>
</li>
<li>
<div>Cloud Web Security and Web Security Appliance support</div>
</li>
<li>
<div>Cisco <strong>Advanced Malware Protection</strong> for Endpoints Enabler. AMP for Endpoints is licensed separately</div>
</li>
<li>
<div>Network Access Manager</div>
</li>
<li>
<div>Federal Information Processing Standards (<strong>FIPS</strong>) Compliance</div>
</li>
</ul>
<p style="text-align: justify;">It is worth noting that <strong>AnyConnect 3.x</strong> required the purchase of<strong> Essentials</strong> or <strong>Premium</strong> license + <strong>AnyConnect Mobile</strong> (L-ASA-AC-M-55xx) in order to support mobile devices (Smartphones, Tablets etc.).&nbsp;<strong> AnyConnect Mobile</strong> is now <strong>integrated</strong> into the new<strong> AnyConnect Plus</strong> license.</p>
<h2 style="text-align: justify;">Cisco AnyConnect Plus Perpetual (permanent) License</h2>
<p style="text-align: justify;">The <strong>AnyConnect Plus Perpetual license</strong> supports the same features as the <strong>Plus license</strong> above, but with the difference that it is a permanent license.<br />&nbsp;<br />The customer <strong>purchases it once</strong> and <strong>does not have any subscription services</strong>, however it is still required to purchase a <strong>software application support plus upgrade (SASU)</strong> contract. This is covered in detail at the end of this article.</p>
<p style="text-align: justify;">Customers considering the<strong> Plus Perpetual license</strong> should <strong>compare costs</strong> with the <strong>subscription-based license</strong> to see if it is worth going down that path.</p>
<h2 style="text-align: justify;">Cisco AnyConnect Apex License (Old Premium License)</h2>
<p style="text-align: justify;">The <strong>AnyConnect Apex License</strong> includes<strong> all offerings in the AnyConnect Plus license</strong> plus the following:</p>
<ul class="checkbox">
<li>
<div><strong>All AnyConnect Plus features</strong></div>
</li>
<li>
<div><strong>Clientless</strong> (browser-based) <strong>VPN Termination</strong> on the Cisco ASA Firewall appliance</div>
</li>
<li>
<div>VPN compliance and posture agent in conjunction with the Cisco ASA Firewall appliance</div>
</li>
<li>
<div>Unified compliance and posture agent in conjunction with the Cisco Identity Services Engine (ISE) 1.3 or later</div>
</li>
<li>
<div>Support for <strong>stronger Next-generation encryption</strong> (<strong>Suite B</strong>)</div>
</li>
</ul>
<p style="text-align: justify;">The <strong>AnyConnect Apex license</strong> is only available as a <strong>subscription-based license</strong>. There is no perpetual license available.<br />&nbsp;<br />The<strong> Next Generation Suite B</strong> encryption supports the following stronger encryption standards:</p>
<ul class="check">
<li style="text-align: justify;"><strong>Advanced Encryption Standard (AES)</strong> with <strong>key sizes</strong> of<strong> 128</strong> and<strong> 256 bits</strong>.</li>
<li style="text-align: justify;"><strong>Elliptic Curve Digital Signature Algorithm (ECDSA)</strong> — digital signatures</li>
<li style="text-align: justify;"><strong>Elliptic Curve Diffie–Hellman (ECDH)</strong> — key exchange agreement</li>
<li style="text-align: justify;"><strong>Secure Hash Algorithm 2 (SHA-256 and SHA-384)</strong> — message digest</li>
</ul>
<h2 style="text-align: left;">Purchasing AnyConnect Licenses &amp; Important Notes – Understand SAS &amp; SASU For AnyConnect</h2>
<p style="text-align: justify;">While AnyConnect licensing has been simplified, there are still a few important areas we must be aware of to avoid licensing and future upgrade issues.</p>
<p style="text-align: justify;">Before we dive in, we need to clarify what<strong> Software Application Support (SAS)</strong> and <strong>Software Application Support plus Upgrade (SASU)</strong> is because they are required with AnyConnect licenses:</p>
<p style="text-align: justify;"><strong>SAS:</strong>&nbsp; Provides access to Cisco’s latest <strong>software application updates</strong> (e.g AnyConnect, VPN Client software). SAS also <strong>includes minor release updates</strong> (e.g. AnyConnect 4.0 to 4.1 upgrade) and <strong>24-hour technical assistance</strong> from <strong>Cisco TAC</strong> (Only for the specific software/application) and unrestricted access to online tools.</p>
<p style="text-align: justify;"><strong>SASU:</strong> Includes everything provided in <strong>SAS, plus major upgrade release</strong> of the software e.g from AnyConnect 4.x to AnyConnect 5.x (when available).</p>
<p style="text-align: justify;">When purchasing <strong>AnyConnect Plus</strong> or <strong>AnyConnect Apex subscription-based licenses</strong>, <strong>SASU</strong> is <strong>already included</strong> and is not required to be purchased separately.<br />&nbsp;<br />When purchasing <strong>AnyConnect Plus Perpetual</strong> licenses, <strong>SASU must be purchased</strong>.&nbsp; To do so, you need to order the following:</p>
<ol>
<li style="text-align: justify;">Order the <strong>Cisco AnyConnect Plus Perpetual License (L-AC-PLS-P-G)</strong> which has no cost ($0)</li>
<li style="text-align: justify;">Add the <strong>User License</strong> required e.g <strong>Cisco AnyConnect Plus - Perpetual License/25 users (AC-PLS-P-25-S)</strong></li>
<li style="text-align: justify;">Add the <strong>SASU</strong> product for the selected <strong>User License (AC-PLS-P-25-S)</strong>. In our example the <strong>SASU</strong> product will be <strong>CON-SAU-ACPL25</strong>. It is also necessary to specify the <strong>duration of the contract (1 – 60 months)</strong>. The longer the duration, the larger the cost.</li>
</ol>
<p style="text-align: justify;"><strong>Full product ID’s </strong>for<strong> AnyConnect Plus, Plus Perpetual</strong> and <strong>Apex licenses</strong> along with all subscriptions and <strong>SASU products</strong> are available in the <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-anyconnect-secure-mobility-client.html" target="_blank" title="Cisco AnyConnect Ordering Guide">Cisco AnyConnect Ordering Guide</a> freely available from our <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides.html" target="_blank" title="Cisco Product Datasheets &amp; Guides">Cisco Product Datasheets &amp; Guides</a> <strong>section</strong>.</p>
<p style="text-align: justify;">Below we are including a list of the maximum VPN peers/sessions supported by each ASA Firewall appliance to help customers decide the amount of AnyConnect licenses they require:</p>
<p style="text-align: justify;"><strong>Cisco ASA Maximum VPN Peers / Sessions</strong></p>
<p style="text-align: justify;">5505 = 25<br />5510 = 250<br />5520 = 750<br />5540 = 5,000<br />5550 = 5,000<br />5580 = 10,000</p>
<p style="text-align: justify;"><strong>Cisco ASA Next Generation Platform (X) VPN Peers / Sessions</strong></p>
<p style="text-align: justify;">5512-X = 250<br />5515-X = 250<br />5525-X = 750<br />5545-X = 2,500<br />5555-X = 5,000<br />5585-X = 10,000</p>
<h2 style="text-align: justify;">Cisco AnyConnect Plus, AnyConnect Apex Migration Licenses</h2>
<p style="text-align: justify;">Cisco customers who purchased AnyConnect Essentials, Premium and Shared Premium licenses <strong>prior to March 2 2015</strong>, can <strong>transition to the new Plus/Apex licenses</strong> by ordering the <strong>Plus/Apex Migration subscription licenses</strong> for <strong>5, 3</strong> or <strong>1-year term</strong>.</p>
<p class="box-info" style="text-align: justify;">The last day to purchase <strong>AnyConnect Migration licenses</strong> is <strong>31st of December 2015</strong>.</p>
<p style="text-align: justify;">The <strong>AnyConnect Migration license</strong> product IDs are available in the&nbsp;<a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-anyconnect-secure-mobility-client.html" target="_blank" title="Cisco AnyConnect Ordering Guide">Cisco AnyConnect Ordering Guide</a> freely available from our&nbsp;<a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides.html" target="_blank" title="Cisco Product Datasheets &amp; Guides">Cisco Product Datasheets &amp; Guides</a> <strong>section</strong>.</p>
<p style="text-align: justify;">This article explained the new <strong>Cisco AnyConnect 4.x licensing model</strong>. We analysed the three new simplified<strong> licensing options AnyConnect Plus, Plus Perpetual</strong> and <strong>AnyConnect Apex</strong>, including the<strong> features each license</strong> supports and <strong>how they map</strong> to the old <strong>Essentials and Premium licenses.</strong> We covered the operating systems supported by AnyConnect 4.x, ordering product IDs and analysed the <strong>SASU services</strong> required with <strong>AnyConnect Perpetual&nbsp; licenses, AnyConnect Migration licenses</strong> while also noting the <strong>maximum VPN sessions</strong> supported by all available <strong>ASA Firewall appliances</strong>.</p>]]></description>
			<category>Cisco Firewalls</category>
			<pubDate>Mon, 13 Jul 2015 06:08:42 +1000</pubDate>
		</item>
		<item>
			<title>Cisco ASA5500 (5505, 5510, 5520, etc) Series Firewall Security Appliance Startup Configuration &amp; Basic Concepts</title>
			<link>https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa5500-startup.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-firewalls/cisco-asa5500-startup.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx//images/stories/cisco-asa5500-basic-config-1.jpg" alt="cisco-asa5500-basic-config-1" width="280" height="140" style="margin: 7px; float: left;" title="Cisco ASA5505 Firewall &amp; Cisco Press Books" />The <strong>Cisco ASA 5500 series security appliances</strong> have been around for quite some time and are amongst the most popular hardware firewalls available in the market. Today Firewall.cx takes a look at how to easily setup a Cisco ASA5500 series firewall to perform basic functions, more than enough to provide secure &amp; restricted access to the Internet, securely access and manage the ASA Firewall and more.</p>
<p style="text-align: justify;">While many consider the Cisco ASA Firewalls complex and difficult to configure devices, Firewall.cx aims to break that myth and show how easy you can setup an ASA Firewall to deliver basic and advanced functionality. We’ve done it with other Cisco technologies and devices, and we’ll do it again :)</p>
<p style="text-align: left;">The table below provides a brief comparison between the different ASA5500 series security appliances:</p>
<table border="1" style="width: 71%; margin-left: auto; margin-right: auto;" cellspacing="0" cellpadding="0">
<tbody>
<tr style="background-color: #000066;">
<td style="text-align: center; width: 20%;" valign="top">
<p><span style="color: #ffffff;"><strong>Feature</strong></span></p>
</td>
<td style="text-align: center; width: 18%;" valign="top">
<p><span style="color: #ffffff;"><strong>Cisco ASA 5505</strong></span></p>
</td>
<td style="text-align: center; width: 14%;" valign="top">
<p><span style="color: #ffffff;"><strong>Cisco ASA 5510</strong></span></p>
</td>
<td style="text-align: center; width: 16%;" valign="top">
<p><span style="color: #ffffff;"><strong>Cisco ASA 5520</strong></span></p>
</td>
<td style="text-align: center; width: 14%;" valign="top">
<p><span style="color: #ffffff;"><strong>Cisco ASA 5540</strong></span></p>
</td>
<td style="text-align: center; width: 14%;" valign="top">
<p><span style="color: #ffffff;"><strong>Cisco ASA 5550</strong></span></p>
</td>
</tr>
<tr>
<td style="width: 20%;" valign="top">
<p><strong>Users/Nodes</strong></p>
</td>
<td style="width: 18%;" valign="top">
<p>10, 50, or unlimited</p>
</td>
<td style="width: 14%;" valign="top">
<p>Unlimited</p>
</td>
<td style="width: 16%;" valign="top">
<p>Unlimited</p>
</td>
<td style="width: 14%;" valign="top">
<p>Unlimited</p>
</td>
<td style="width: 14%;" valign="top">
<p>Unlimited</p>
</td>
</tr>
<tr>
<td style="width: 20%;" valign="top">
<p><strong>Firewall Throughput</strong></p>
</td>
<td style="width: 18%;" valign="top">
<p>Up to 150 Mbps</p>
</td>
<td style="width: 14%;" valign="top">
<p>Up to 300 Mbps</p>
</td>
<td style="width: 16%;" valign="top">
<p>Up to 450 Mbps</p>
</td>
<td style="width: 14%;" valign="top">
<p>Up to 650 Mbps</p>
</td>
<td style="width: 14%;" valign="top">
<p>Up to 1.2 Gbps</p>
</td>
</tr>
<tr>
<td style="width: 20%;" valign="top">
<p><strong>Maximum Firewall and IPS Throughput</strong></p>
</td>
<td style="width: 18%;" valign="top">
<p>• Up to 150 Mbps with AIP-SSC-5</p>
</td>
<td style="width: 14%;" valign="top">
<p>• Up to 150 Mbps with AIP-SSM-10</p>
<p>• Up to 300 Mbps with AIP-SSM-20</p>
</td>
<td style="width: 16%;" valign="top">
<p>• Up to 225 Mbps with AIP-SSM-10</p>
<p>• Up to 375 Mbps with AIP-SSM-20</p>
<p>• Up to 450 Mbps with AIP-SSM-40</p>
</td>
<td style="width: 14%;" valign="top">
<p>• Up to 500 Mbps with AIP-SSM-20</p>
<p>• Up to 650 Mbps with AIP-SSM-40</p>
</td>
<td style="width: 14%;" valign="top">
<p>Not available</p>
</td>
</tr>
<tr>
<td style="width: 20%;" valign="top">
<p><strong>3DES/AES VPN Throughput<sup>***</sup></strong></p>
</td>
<td style="width: 18%;" valign="top">
<p>Up to 100 Mbps</p>
</td>
<td style="width: 14%;" valign="top">
<p>Up to 170 Mbps</p>
</td>
<td style="width: 16%;" valign="top">
<p>Up to 225 Mbps</p>
</td>
<td style="width: 14%;" valign="top">
<p>Up to 325 Mbps</p>
</td>
<td style="width: 14%;" valign="top">
<p>Up to 425 Mbps</p>
</td>
</tr>
<tr>
<td style="width: 20%;" valign="top">
<p><strong>IPsec VPN Peers</strong></p>
</td>
<td style="width: 18%;" valign="top">
<p>10; 25</p>
</td>
<td style="width: 14%;" valign="top">
<p>250</p>
</td>
<td style="width: 16%;" valign="top">
<p>750</p>
</td>
<td style="width: 14%;" valign="top">
<p>5000</p>
</td>
<td style="width: 14%;" valign="top">
<p>5000</p>
</td>
</tr>
<tr>
<td style="width: 20%;" valign="top">
<p><strong>Premium AnyConnect VPN Peers<sup>*</sup> (Included/Maximum)</strong></p>
</td>
<td style="width: 18%;" valign="top">
<p>2/25</p>
</td>
<td style="width: 14%;" valign="top">
<p>2/250</p>
</td>
<td style="width: 16%;" valign="top">
<p>2/750</p>
</td>
<td style="width: 14%;" valign="top">
<p>2/2500</p>
</td>
<td style="width: 14%;" valign="top">
<p>2/5000</p>
</td>
</tr>
<tr>
<td style="width: 20%;" valign="top">
<p><strong>Concurrent Connections</strong></p>
</td>
<td style="width: 18%;" valign="top">
<p>10,000; 25,000<sup>*</sup></p>
</td>
<td style="width: 14%;" valign="top">
<p>50,000; 130,000<sup>*</sup></p>
</td>
<td style="width: 16%;" valign="top">
<p>280,000</p>
</td>
<td style="width: 14%;" valign="top">
<p>400,000</p>
</td>
<td style="width: 14%;" valign="top">
<p>650,000</p>
</td>
</tr>
<tr>
<td style="width: 20%;" valign="top">
<p><strong>New Connections/Second</strong></p>
</td>
<td style="width: 18%;" valign="top">
<p>4000</p>
</td>
<td style="width: 14%;" valign="top">
<p>9000</p>
</td>
<td style="width: 16%;" valign="top">
<p>12,000</p>
</td>
<td style="width: 14%;" valign="top">
<p>25,000</p>
</td>
<td style="width: 14%;" valign="top">
<p>33,000</p>
</td>
</tr>
<tr>
<td style="width: 20%;" valign="top">
<p><strong>Integrated Network Ports</strong></p>
</td>
<td style="width: 18%;" valign="top">
<p>8-port Fast Ethernet switch (including 2 PoE ports)</p>
</td>
<td style="width: 14%;" valign="top">
<p>5 Fast Ethernet ports; 2 Gigabit Ethernet + 3 Fast Ethernet ports<sup>*</sup></p>
</td>
<td style="width: 16%;" valign="top">
<p>4 Gigabit Ethernet, 1&nbsp;Fast Ethernet</p>
</td>
<td style="width: 14%;" valign="top">
<p>4 Gigabit Ethernet, 1&nbsp;Fast Ethernet</p>
</td>
<td style="width: 14%;" valign="top">
<p>8 Gigabit Ethernet, 4&nbsp;SFP Fiber, 1&nbsp;Fast Ethernet</p>
</td>
</tr>
<tr>
<td style="width: 20%;" valign="top">
<p><strong>Virtual Interfaces (VLANs)</strong></p>
</td>
<td style="width: 18%;" valign="top">
<p>3 (no trunking support)/20 (with trunking support)<sup>*</sup></p>
</td>
<td style="width: 14%;" valign="top">
<p>50/100<sup>*</sup></p>
</td>
<td style="width: 16%;" valign="top">
<p>150</p>
</td>
<td style="width: 14%;" valign="top">
<p>200</p>
</td>
<td style="width: 14%;" valign="top">
<p>400</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: left;">Users can also download the <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-asa-5500-series-adaptive-security-appliances.html" target="_blank" title="ASA complete technical datasheet">complete technical datasheet</a> for the Cisco ASA 5500 series firewalls by visiting our <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides.html" target="_blank" title="Cisco Product Datasheet &amp; Guides Download section">Cisco Product Datasheet &amp; Guides Download section</a>.</p>
<p style="text-align: justify;">Perhaps one of the most important points, especially for an engineer with limited experience, is that configuring the smaller ASA 5505 Firewall does not really differ from configuring the larger ASA5520 Firewall. The same steps are required to setup pretty much all ASA 5500 series Firewalls – which is Great News!</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-asa5500-basic-config-2.jpg" alt="cisco-asa5500-basic-config-2" width="400" height="197" style="margin: 7px auto; display: block; vertical-align: middle;" title="Cisco ASA5510, ASA5520, ASA5540  Firewall Setup &amp; Configuration" /></p>
<p style="text-align: justify;">The main differences besides the licenses, which enable or disable features, are the physical interfaces of each ASA model (mainly between the ASA 5505 and the larger 5510/5520) and possibly modules that might be installed. In any case, we should keep in mind that if we are able to configure a small ASA5505 then configuring the larger models won’t be an issue.</p>
<p style="text-align: justify;">At the time of writing of this article Firewall.cx came across a Cisco ASA5505, so we decided to put it to good use for this article, however, do note that all commands and configuration philosophy is the same across all ASA5500 series security appliances.</p>
<div class="box-warning" style="text-align: justify;">Note: ASA software <strong>version 8.3.0</strong> and above use <strong>different NAT configuration commands</strong>. This article provides both old style (up to v8.2.5) and new style (v8.3 onwards) NAT configuration commands.</div>
<h2>ASA5500 Series Configuration Check-List</h2>
<p style="text-align: justify;">We’ve created a simple configuration check-list that will help us keep track of the configured services on our ASA Firewall. Here is the list of items that will be covered in this article:</p>
<ul class="checkbox check">
<li>Erase existing configuration</li>
<li>Configure Hostname, Users, Enable password &amp; Disable Anonymous Reporting</li>
<li>Configure interface IP addresses or Vlan IP addresses (ASA5505) &amp; Descriptions</li>
<li>Setup Inside (private) &amp; Outside (public) Interfaces</li>
<li>Configure default route (default Gateway) &amp; static routes</li>
<li>Configure Network Address Translation (NAT) for Internal Networks</li>
<li>Configure ASA DHCP Server</li>
<li>Configure AAA authentication for local database user authentication</li>
<li>Enable HTTP Management for inside interface</li>
<li>Enable SSH &amp; Telnet Management for inside and outside interfaces</li>
<li>Create, configure and apply TCP/UDP Object-Groups to firewall access lists</li>
<li>Configuration of access-lists for ICMP packets to the Internet</li>
<li>Apply Firewall access lists to ‘inside’ and ‘outside’ interfaces</li>
<li>Configure logging/debugging of events and errors</li>
</ul>
<p style="text-align: justify;">Note: it is highly advisable to frequently save the ASA configuration to ensure no work is lost in the event of a power failure or accident restart.</p>
<p style="text-align: justify;">Saving the configuration can be easily done using the <strong>write memory</strong> command:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>write memory</strong><br />
<div>Building configuration...</div>
<div>Cryptochecksum: c0aee665 598d7cd3 7fbfe1a5 a2d40ab1</div>
<div>3270 bytes copied in 1.520 secs (3270 bytes/sec)</div>
<div>[OK]</div>
</div>
<h2>Erasing Existing Configuration</h2>
<p style="text-align: justify;">This first step is optional as it will erase the firewall’s configuration. If the firewall has been previously configured or used it is a good idea to start off with the factory defaults. If we are not certain, we prefer to wipe it clean and start from scratch.</p>
<p style="text-align: justify;">Once the configuration is deleted we need to force a reboot, however, take note that it’s important <strong>not</strong> to save the system config to ensure the running-config is not copied to the startup-config otherwise we’ll have to start this process again:</p>
<div class="box-content" style="text-align: justify;">ciscoasa(config)# <strong><strong>write erase<br /></strong></strong>
<div>Erase configuration in flash memory? <strong>[confirm] </strong></div>
<div>[OK]</div>
<div>ciscoasa(config)# <strong>reload</strong></div>
<div>System config has been modified. Save? [Y]es/[N]o: <strong>&nbsp;N</strong></div>
<div>Proceed with reload? <strong>[confirm]</strong></div>
<div>ciscoasa(config)#</div>
<div>***</div>
<div>*** --- START GRACEFUL SHUTDOWN ---</div>
<div>Shutting down isakmp</div>
<div>Shutting down webvpn</div>
<div>Shutting down File system</div>
<div>***</div>
<div>*** --- SHUTDOWN NOW ---</div>
<div>Process shutdown finished</div>
<div>Rebooting.....</div>
</div>
<h2 style="text-align: justify;">Configure Hostname, Users, 'Enable' Password &amp; Disable Anonymous Reporting</h2>
<p style="text-align: justify;">Next, we need to configure the <strong>Enable </strong>password, required for privileged exec mode access, and then user accounts that will have access to the firewall.&nbsp;</p>
<p style="text-align: justify;">The ASA Firewall won’t ask for a username/password when logging in next, however, the default enable password of ‘<strong>cisco</strong>’, will be required to gain access to privileged mode:</p>
<div class="box-content" style="text-align: justify;">Ciscoasa&gt; <strong>enable</strong><br />
<div>Password: cisco</div>
<div>ciscoasa#&nbsp; <strong>configure terminal</strong></div>
<div>ciscoasa(config)#</div>
<div>***************************** NOTICE *****************************</div>
<div>Help to improve the ASA platform by enabling anonymous reporting,</div>
<div>which allows Cisco to securely receive minimal error and health</div>
<div>information from the device. To learn more about this feature,</div>
<div>please visit: http://www.cisco.com/go/smartcall</div>
<div><br />Would you like to enable anonymous error reporting to help improve</div>
<div>the product? [Y]es, [N]o, [A]sk later: <strong>N</strong></div>
<div><br />In the future, if you would like to enable this feature,</div>
<div>issue the command "call-home reporting anonymous".</div>
<div>Please remember to save your configuration.</div>
<div><br />At this point we need to note that when starting off with the factory default configuration, as soon as we enter the ‘configure terminal’ command, the system will ask if we would like to enable Cisco’s call-home reporting feature. We declined the offer and continued with our setup:<br /><br /></div>
<div>ciscoasa(config)# <strong>hostname ASA5505</strong></div>
<div>ASA5505(config)# <strong>enable password firewall.cx</strong></div>
<div>ASA5505(config)# <strong>username admin password s1jw$528ds2 privilege 15</strong></div>
</div>
<p style="text-align: justify;">The <strong>privilege 15</strong> parameter at the end of the command line ensures the system is aware that this is an account with full privileges and has access to all configuration commands including erasing the configuration and files on the device’s flash disk, such as the operating system.</p>
<h2>Configure Interface IP addresses / VLAN IP Addresses &amp; Descriptions</h2>
<p style="text-align: justify;">Depending on the ASA appliance we have, we can configure physical interfaces (inside/outside) with IP addresses, usually done with ASA5510 and larger models,&nbsp; or create VLANs (inside/outside) and configure them with IP addresses, usually with the smaller ASA5505 models.</p>
<p style="text-align: justify;">In many cases network engineers use VLAN interfaces on the larger ASA5500 models, however, this depends on the licensing capabilities of the device, existing network setup and more.</p>
<p style="text-align: justify;">In the case of the ASA5505 we must use VLAN interfaces, which are configured with their appropriate IP addresses and then (next step) characterised as <strong>inside </strong>(private) or <strong>outside </strong>(public) interfaces:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>interface vlan 1</strong><br />
<div>ASA5505(config)# description Private-Interface</div>
<div>ASA5505(config-if)# ip address 10.71.0.1 255.255.255.0</div>
<div>ASA5505(config-if)# no shutdown</div>
<div>!</div>
<div>ASA5505(config)# <strong>interface vlan 2</strong></div>
<div>ASA5505(config)# description Public-Interface</div>
<div>ASA5505(config-if)# ip address 192.168.3.50 255.255.255.0</div>
<div>ASA5505(config-if)# no shutdown</div>
<div>!</div>
<div>ASA5505(config)# <strong>interface ethernet 0/0</strong></div>
<div>ASA5505(config-if)# switchport access vlan 2</div>
<div>ASA5505(config-if)# no shutdown</div>
</div>
<div>Alternatively, the <strong>Public </strong>interface&nbsp; (<strong>VLAN2</strong>) can be configured to obtain its IP address automatically via DHCP with the following command:</div>
<div class="box-content">ASA5505(config)# <strong>interface vlan 2</strong><br />
<div>ASA5505(config)# description Public-Interface</div>
<div>ASA5505(config-if)# ip address dhcp setroute</div>
<div>ASA5505(config-if)# no shutdown</div>
</div>
<p>The <strong>setroute </strong>parameter at the end of the command will ensure the ASA Firewall sets its <strong>default route</strong> (gateway) using the <strong>default gateway</strong> parameter the DHCP server provides.</p>
<p style="text-align: justify;">After configuring VLAN1 &amp; VLAN2 with the appropriate IP addresses, we configured <strong>ethernet 0/0</strong> as an access link for VLAN2 so we can use it as a physical public interface.&nbsp; Out of the 8 total Ethernet interfaces the ASA5505 has, at least one must be set with the <strong>switchport access vlan 2</strong> otherwise there won’t be any physical public interface on the ASA for our frontend router to connect to. Ethernet ports <strong>0/1</strong> to <strong>0/7</strong> must also be configured with the <strong>no shutdown</strong> command in order make them operational. All of these ports are, by default, access links for VLAN1. Provided are the configuration commands for the first two ethernet interface as the configuration is identical for all:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>interface ethernet 0/1</strong><br />
<div>ASA5505(config-if)# no shutdown</div>
<div>ASA5505(config-if)# <strong>interface ethernet 0/2</strong></div>
<div>ASA5505(config-if)# no shutdown</div>
</div>
<h2>Setup Inside (private) &amp; Outside (public) Interfaces</h2>
<p style="text-align: justify;">Next, we must designate the Inside (private) and Outside (public) interfaces. This step is essential and will help the ASA Firewall understand which interface is connected to the trusted (private) and untrusted (public) network:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>interface vlan 1</strong><br />
<div>ASA5505(config-if)# nameif inside</div>
<div>INFO: Security level for "inside" set to 100 by default.<br />!</div>
<div>ASA5505(config)# <strong>interface vlan 2</strong></div>
<div>ASA5505(config-if)# nameif outside<br />INFO: Security level for "outside" set to 0 by default.</div>
</div>
<p style="text-align: justify;">The ASA Firewall will automatically set the <strong>security level</strong> to <strong>100</strong> for <strong>inside interfaces</strong> and <strong>0</strong> to <strong>outside interfaces</strong>.&nbsp; Traffic can flow from higher security levels to lower (private to public), but not the other way around (public to private) unless stated by an access-lists.&nbsp;</p>
<p style="text-align: justify;">To change the security-level of an interface use the <strong>security-level xxx</strong> command by substituting <strong>xxx</strong> with a number from <strong>0</strong> to <strong>100</strong>. The higher the number, the higher the security level.&nbsp; <strong>DMZ interfaces</strong> are usually configured with a security level of 50.</p>
<p style="text-align: justify;">It is extremely important the necessary caution is taken when selecting and applying the inside/outside interfaces on any ASA Firewall.</p>
<h2>Configure Default Route (default gateway) &amp; Static Routes</h2>
<p style="text-align: justify;">The default route configuration command is necessary for the ASA Firewall to route packets outside the network via the next hop, usually a router. In case the public interface (VLAN2) is configured using the <strong>ip address dhcp setroute</strong> command, configuration of the default gateway is not required.</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>route outside 0.0.0.0 0.0.0.0 192.168.3.1&nbsp;</strong></div>
<div style="text-align: justify;">At this point, it’s a good idea to try testing the next-hop router and confirm the ASA Firewall can reach it:</div>
<div class="box-content" style="text-align: justify;">ASA5505(config)#<strong> ping 192.168.3.1</strong><br />
<div>Type escape sequence to abort.</div>
<div>Sending 5, 100-byte ICMP Echos to 192.168.3.1, timeout is 2 seconds:</div>
<div>!!!!!</div>
<div>Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms</div>
</div>
<p style="text-align: justify;">For networks with multiple internal VLANs, it is necessary to configure static routes to ensure the ASA Firewall knows how to reach them. Usually these networks can be reached via a Layer3 switch or an internal router.&nbsp; For our example, we’ll assume we have two networks: 10.75.0.0/24 &amp; 10.76.0.0/24 which we need to provide Internet access to. These additional networks are contactable via a Layer3 device with IP address 10.71.0.100:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>route outside 10.75.0.0 0.0.0.0 10.71.0.100</strong><br />ASA5505(config)# <strong>route outside 10.76.0.0 0.0.0.0 10.71.0.100</strong></div>
<h2 style="text-align: justify;">Configure Network Address Translation (NAT) For Internal Networks</h2>
<p style="text-align: justify;">This is the last step required to successfully provide Internet access to our internal networks. Network Address Translation is essential to masquerade our internal network using the single IP address our Public interface has been configured with.&nbsp; Network Address Translation, along with all its variations (Static, Dynamic etc), is covered in great depth in our popular <a href="https://www.firewall.cx/networking/network-address-translation.html" target="_blank" title="Network Address Translation">Network Address Translation</a> section.</p>
<p style="text-align: justify;">We should note at this point that <strong>NAT configuration</strong> has slightly changed with ASA software version <strong>8.3</strong> and <strong>above</strong>. We will provide both commands to cover installations with software version up to <strong>v8.2.5</strong> and from <strong>v8.3</strong> and <strong>above</strong>.</p>
<p style="text-align: justify;">The following commands apply to <strong>ASA</strong> appliances with software version up to <strong>8.2.5</strong>:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>global (outside) 1 interface</strong><br />
<div>INFO: outside interface address added to PAT pool</div>
<div>ASA5505(config)# <strong>nat (inside) 1 10.71.0.0 255.255.255.0</strong></div>
<div>ASA5505(config)# <strong>nat (inside) 1 10.75.0.0 255.255.255.0</strong></div>
<div>ASA5505(config)# <strong>nat (inside) 1 10.76.0.0 255.255.255.0</strong></div>
</div>
<p style="text-align: justify;">In the above configuration, the ASA Firewall is instructed to NAT all internal networks using the <strong>NAT Group 1</strong>. The number ‘<strong>1</strong>’ is used to identify the NAT groups for the NAT process between the inside and outside interfaces.</p>
<p style="text-align: justify;">The <strong>global (outside) 1 interface</strong> command instructs the ASA Firewall to perform NAT using the IP address assigned to the outside interface.</p>
<p style="text-align: justify;">Another method of configuring NAT is with the use of access lists. In this case, we define the internal IP addresses to be NAT’ed with the use of access lists:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>access-list NAT-ACLs extended permit ip 10.71.0.0 255.255.255.0 any</strong><br />
<div>ASA5505(config)#<strong> access-list NAT-ACLs extended permit ip 10.75.0.0 255.255.255.0 any</strong></div>
<div>ASA5505(config)# <strong>access-list NAT-ACLs extended permit ip 10.76.0.0 255.255.255.0 any</strong></div>
<div>ASA5505(config)# <strong>global (outside) 1 interface</strong></div>
<div>INFO: outside interface address added to PAT pool</div>
<div>ASA5505(config)# <strong>nat (inside) 1 access-list NAT-ACLs</strong></div>
</div>
<p style="text-align: justify;">NAT with the use of access lists provides greater flexibility and control which IP addresses or networks will use the NAT service.</p>
<p style="text-align: justify;">With software version 8.3 and newer, things have changed dramatically and there are no more access lists in NAT configuration lines.</p>
<p style="text-align: justify;">The new NAT format now utilizes "object network", "object service" and "object-group network" to define the parameters of the&nbsp; NAT&nbsp; configuration.</p>
<p style="text-align: justify;">The following commands (software version 8.3 and above) will provide NAT services to our internal networks so they can access the Internet:</p>
<div class="box-content">ASA5505(config)# <strong>object network network1</strong><br />
<div>ASA5505(config-network-object)# subnet 10.71.0.0 255.255.255.0</div>
<div>ASA5505(config-network-object)# nat (inside,outside) dynamic interface<br />!</div>
<div>ASA5505(config)# <strong>object network network2</strong></div>
<div>ASA5505(config-network-object)# subnet 10.75.0.0 255.255.255.0</div>
<div>ASA5505(config-network-object)# nat (inside,outside) dynamic interface<br />!</div>
<div>ASA5505(config)# <strong>object network network3</strong></div>
<div>ASA5505(config-network-object)# subnet 10.76.0.0 255.255.255.0</div>
<div>ASA5505(config-network-object)# nat (inside,outside) dynamic interface</div>
</div>
<h2>Configuring The ASA DHCP Server</h2>
<p style="text-align: justify;">The existence of a DHCP server is necessary in most cases as it helps manage the assignment of IP address to our internal hosts. The ASA Firewall can be configured to provide DHCP services to our internal network, a very handy and welcome feature.</p>
<p style="text-align: justify;">Again, there are some limitations with the DHCP service configuration which vary with the ASA model used. In our ASA5505, the maximum assigned IP addreses for the DHCP pool was just 128!</p>
<p style="text-align: justify;">Note that the DHCP service can run on all ASA interfaces so it is necessary to specify which interface the DHCP configuration parameters are for:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>dhcpd address 10.71.0.50-10.71.0.200 inside</strong><br />
<div>Warning, DHCP pool range is limited to 128 addresses, set address range as: 10.71.0.50-10.71.0.177</div>
<div>ASA5505(config)# <strong>dhcpd address 10.71.0.50-10.71.0.128 inside</strong></div>
<div>ASA5505(config)# <strong>dhcpd dns 8.8.8.8 interface inside</strong></div>
</div>
<p style="text-align: justify;">Once configured, the DHCP service will begin working and assigning IP addresses to the clients. The <strong>Gateway IP address</strong> parameter is automatically provided to client and is not required to be configured on the ASA Firewall appliance.</p>
<p style="text-align: justify;">We can verify the DHCP service is working using the <strong>show dhcpd statistics</strong> command:</p>
<div class="box-content">ASA5505(config)# <strong>show dhcpd statistics</strong><br />
<div>DHCP UDP Unreachable Errors: 0</div>
<div>DHCP Other UDP Errors: 0</div>
<div>Address pools&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</div>
<div>Automatic bindings&nbsp;&nbsp; 1</div>
<div>Expired bindings&nbsp;&nbsp;&nbsp;&nbsp; 0</div>
<div>Malformed messages&nbsp;&nbsp; 0<br /><br /></div>
<div>&nbsp;<strong>Message&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Received</strong></div>
<div>&nbsp;BOOTREQUEST&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0</div>
<div>&nbsp;DHCPDISCOVER&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; &nbsp; 1</div>
<div>&nbsp;DHCPREQUEST&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</div>
<div>&nbsp;DHCPDECLINE&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0</div>
<div>&nbsp;DHCPRELEASE&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0</div>
<div>&nbsp;DHCPINFORM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</div>
</div>
<p>If required, we can clear the DHCP bindings (assigned IP addresses) using the <strong>clear dhcpd binding </strong>command.</p>
<h2>Configure AAA Authentication For Local Database User Authentication</h2>
<p style="text-align: justify;"><strong>Configuring AAA authentication</strong> is always a good idea as it instructs the ASA Firewall to use the local user database for the various services it's running. For example, we can tell the ASA Firewall to use a radius server for VPN user authentication, but use its local database for <strong>telnet</strong>, <strong>ssh</strong> or <strong>HTTP</strong> (<strong>ASDM</strong>) management access to the Firewall appliance.</p>
<p style="text-align: justify;">As mentioned, our example instructs the <strong>ASA Firewall</strong> to use its local database:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)#<strong> aaa authentication telnet console LOCAL</strong><br />
<div>ASA5505(config)# <strong>aaa authentication http console LOCAL</strong></div>
<div>ASA5505(config)# <strong>aaa authentication ssh console LOCAL</strong></div>
</div>
<h2>Enable HTTP Management For Inside Interface</h2>
<p style="text-align: justify;">We now turn to the management settings of our ASA Firewall to <strong>enable</strong> and <strong>configure HTTP management</strong>. This will allow access to the Firewall’s management via the popular <strong>ASDM management application</strong>:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>http 10.71.0.0 255.255.255.0 inside</strong><br />
<div>WARNING: http server is not yet enabled to allow ASDM access.</div>
<div>ASA5505(config)#<strong> http server enable</strong></div>
</div>
<p>The above commands enable HTTP management on the ASA Firewall only for the network 10.71.0.0/24.</p>
<h2>Enable SSH &amp; Telnet Management For Inside &amp; Outside Interfaces</h2>
<p style="text-align: justify;"><strong>Enabling SSH</strong> and <strong>Telnet</strong> access to the <strong>Cisco Firewall</strong> is pretty straightforward. While we always recommend the use of SSH, especially when accessing the Firewall from public IPs, telnet is also an option, however, we must keep in mind that telnet management methods do not provide any security as all data (including username, passwords and configurations) are sent in clear text.</p>
<p style="text-align: justify;">Before <strong>enabling SSH</strong>, we must <strong>generate RSA key pairs</strong> for identity certificates. Telnet does not require any such step as it does not provide any encryption or security:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong><strong>crypto key generate rsa modulus 1024<br /></strong></strong>
<div>INFO: The name for the keys will be:</div>
<div>Keypair generation process begin. Please wait...</div>
<div>ASA5505(config)# <strong>ssh 10.71.0.0 255.255.255.0 inside</strong></div>
<div>ASA5505(config)# <strong>ssh 200.200.90.5 255.255.255.255 outside</strong></div>
<div>ASA5505(config)# <strong>telnet 10.71.0.0 255.255.255.0 inside</strong></div>
</div>
<p>Note that the ASA Firewall appliance will only accept SSH connections from host 200.200.90.5 arriving on its public interface, while SSH and telnet connections are permitted from network 10.71.0.0/24 on &nbsp;the inside interface.</p>
<h2>Create, Configure &amp; Apply TCP/UDP Object-Groups</h2>
<p style="text-align: justify;">An essential part of any firewall configure is to define the Internet services our users will have access to. This is done by either creating a number of lengthy access lists for each protocol/service and then applying them to the appropriate interfaces, or utilising the ASA Firewall Object-Groups which are then applied to the interfaces. Using Object-groups is easy and recommended as they provide a great deal of flexibility and ease of management.</p>
<p style="text-align: justify;">The logic is simple:&nbsp; Create your <strong>Object-Groups</strong>, insert the protocols and services required, and then reference them in the firewall access -lists. As a last step, we apply them to the interfaces we need.</p>
<p style="text-align: justify;">Let’s use an example to help visualise the concept. Our needs require us to create two Object-Groups, one for TCP and one for UDP services:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)#<strong><strong>object-group service Internet-udp udp<br /></strong></strong>
<div>ASA5505(config-service)# description UDP Standard Internet Services</div>
<div>ASA5505(config-service)# port-object eq domain</div>
<div>ASA5505(config-service)# port-object eq ntp</div>
<div>ASA5505(config-service)# port-object eq isakmp</div>
<div>ASA5505(config-service)# port-object eq 4500<br />!</div>
<div>ASA5505(config-service)#<strong>object-group service Internet-tcp tcp</strong></div>
<div>ASA5505(config-service)# description TCP Standard Internet Services</div>
<div>ASA5505(config-service)# port-object eq www</div>
<div>ASA5505(config-service)# port-object eq https</div>
<div>ASA5505(config-service)# port-object eq smtp</div>
<div>ASA5505(config-service)# port-object eq 465</div>
<div>ASA5505(config-service)# port-object eq pop3</div>
<div>ASA5505(config-service)# port-object eq 995</div>
<div>ASA5505(config-service)# port-object eq ftp</div>
<div>ASA5505(config-service)# port-object eq ftp-data</div>
<div>ASA5505(config-service)# port-object eq domain</div>
<div>ASA5505(config-service)# port-object eq ssh</div>
<div>ASA5505(config-service)# port-object eq telnet</div>
</div>
<p style="text-align: justify;">Now we need to reference our two <strong>Object-groups</strong> using the firewall access lists. Here we can also define which networks will have access to the services listed in each <strong>Object-group</strong>:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>access-list inside-in remark -=[Access Lists For Outgoing Packets from Inside interface]=-</strong><br />
<div>ASA5505(config)# <strong>access-list inside-in extended permit udp 10.71.0.0 255.255.255.0 any object-group Internet-udp</strong></div>
<div>ASA5505(config)# <strong>access-list inside-in extended permit tcp 10.71.0.0 255.255.255.0 any object-group Internet-tcp</strong></div>
<div>ASA5505(config)# <strong>access-list inside-in extended permit tcp 10.75.0.0 255.255.255.0 any object-group Internet-tcp</strong></div>
<div>ASA5505(config)# <strong>access-list inside-in extended permit tcp 10.76.0.0 255.255.255.0 any object-group Internet-tcp</strong></div>
</div>
<p style="text-align: justify;">Note that the 10.71.0.0/25 network has access to both Object-groups services, our other networks are restricted to only the services defined in the TCP Object-group. To understand how Object-groups help simplify access list management: without them, we would require 37 access lists commands instead of just 4!</p>
<h2>Configuration Of Access-Lists For ICMP Packets To The Internet</h2>
<p style="text-align: justify;">To complete our access list configuration we configure our ASA Firewall to allow ICMP echo packets (ping) to any destination, and their replies (echo-reply):</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>access-list inside-in extended permit icmp 10.71.0.0 255.255.255.0 any</strong><br />
<div>ASA5505(config)# <strong>access-list outside-in remark -=[Access Lists For Incoming Packets on OUTSIDE interface]=-</strong></div>
<div>ASA5505(config)# <strong>access-list outside-in extended permit icmp any any echo-reply</strong></div>
</div>
<h2>Appling Firewall Access-Lists To ‘inside’ &amp; ‘outside’ Interfaces</h2>
<p style="text-align: justify;">The last step in configuring our firewall rules involves applying the two access lists, <strong>inside-in</strong> &amp; <strong>outside-in</strong>, to the appropriate interfaces. Once this step is complete the firewall rules are in effect immediately:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>access-group inside-in in interface inside</strong><br />ASA5505(config)# <strong>access-group outside-in in interface outside</strong></div>
<h2 style="text-align: justify;">Configure Logging/Debugging Of Events &amp; Errors</h2>
<p style="text-align: justify;">This last step in our ASA Firewall configuration guide will enable logging and debugging so that we can easily trace events and errors. It is highly recommended to enable logging because it will certainly help troubleshooting the ASA Firewall when problems occur.</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>logging buffered 7</strong><br />
<div>ASA5505(config)# <strong>logging buffer-size 30000</strong></div>
<div>ASA5505(config)#<strong> logging enable</strong></div>
</div>
<p style="text-align: justify;">The commands used above enable log in the <strong>debugging level</strong> (<strong>7</strong>) and sets the buffer size in RAM to <strong>30,000 bytes</strong> (~30Kbytes).</p>
<p>Issuing the <strong>show log </strong>command will reveal a number of important logs including any packets that are processed or denied due to access-lists:</p>
<div class="box-content" style="text-align: justify;">ASA5505(config)# <strong>show log</strong><br />Syslog logging: enabled<br />&nbsp;&nbsp;&nbsp; Facility: 20<br />&nbsp;&nbsp;&nbsp; Timestamp logging: disabled<br />&nbsp;&nbsp;&nbsp; Standby logging: disabled<br />&nbsp;&nbsp;&nbsp; Debug-trace logging: disabled<br />&nbsp;&nbsp;&nbsp; Console logging: disabled<br />&nbsp;&nbsp;&nbsp; Monitor logging: disabled<br />&nbsp;&nbsp;&nbsp; Buffer logging: level debugging, 39925 messages logged<br />&nbsp;&nbsp;&nbsp; Trap logging: disabled<br />&nbsp;&nbsp;&nbsp; History logging: disabled<br />&nbsp;&nbsp;&nbsp; Device ID: disabled<br />&nbsp;&nbsp;&nbsp; Mail logging: disabled<br />&nbsp;&nbsp;&nbsp; ASDM logging: disabled<br />n" [0x0, 0x0]<br />%ASA-4-106023: Deny tcp src inside:10.71.0.50/54843 dst outside:10.0.0.10/445 by access-group "inside-in" [0x0, 0x0]<br />%ASA-4-106023: Deny tcp src inside:10.71.0.50/54845 dst outside:10.0.0.10/445 by access-group "inside-in" [0x0, 0x0]<br />%ASA-4-106023: Deny tcp src inside:10.71.0.50/54844 dst outside:10.0.0.10/445 by access-group "inside-in" [0x0, 0x0]<br />%ASA-4-106023: Deny tcp src inside:10.71.0.50/54850 dst outside:10.0.0.10/139 by access-group "inside-in" [0x0, 0x0]<br />%ASA-4-106023: Deny tcp src inside:10.71.0.50/54843 dst outside:10.0.0.10/445 by access-group "inside-in" [0x0, 0x0]<br />%ASA-4-106023: Deny tcp src inside:10.71.0.50/54845 dst outside:10.0.0.10/445 by access-group "inside-in" [0x0, 0x0]<br />%ASA-4-106023: Deny tcp src inside:10.71.0.50/54844 dst outside:10.0.0.10/445 by access-group "inside-in" [0x0, 0x0]<br />%ASA-4-106023: Deny tcp src inside:10.71.0.50/54850 dst outside:10.0.0.10/139 by access-group "inside-in" [0x0, 0x0]<br />%ASA-4-106023: Deny udp src inside:10.71.0.50/137 dst outside:10.0.0.10/137 by access-group "inside-in" [0x0, 0x0]<br />%ASA-6-302014: Teardown TCP connection 4718 for outside:173.194.40.49/443 to inside:10.71.0.50/54803 duration 0:02:00 bytes 1554462 TCP FINs</div>
<h2>Summary</h2>
<p style="text-align: justify;">This article serves as an <strong>introduction configuration guide</strong> for the <strong>Cisco ASA5500 series Firewall appliances</strong>. We covered all necessary commands required to get any ASA5500 Firewall working and servicing network clients, while also explaining in detail all commands used during the configuration process.</p>
<p><br /><br /></p>]]></description>
			<category>Cisco Firewalls</category>
			<pubDate>Mon, 01 Jul 2013 08:00:00 +1000</pubDate>
		</item>
	</channel>
</rss>
